How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

How should a web application be designed to work on a platform where up to 1000 requests per second can be served?A . Use algorithms like random early detection to deny excessive requests.B . Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who...

April 1, 2020 No Comments READ MORE +

Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)A . Application code writes its event stream to stdout.B . Application log streams are archived in multiple replicated databases.C . Application log streams are sent to log indexing and analysis systems.D ....

April 1, 2020 No Comments READ MORE +

Which statement about microservices architecture is true?

Which statement about microservices architecture is true?A . Applications are written in a single unit.B . It is a complex application composed of multiple independent parts.C . It is often a challenge to scale individual parts.D . A single faulty service can bring the whole application down.View AnswerAnswer: B

April 1, 2020 No Comments READ MORE +

Where should application configuration be stored?

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?A . environment variablesB . YAML filesC . Python librariesD . DockerfilesE . INI filesView AnswerAnswer: B

April 1, 2020 No Comments READ MORE +

Which two methods are API security best practices? (Choose two.)

Which two methods are API security best practices? (Choose two.)A . Use tokens after the identity of a client has been established.B . Use the same operating system throughout the infrastructure.C . Use encryption and signatures to secure data.D . Use basic auth credentials over all internal API interactions.E ....

March 31, 2020 No Comments READ MORE +

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits

DRAG DROP Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits. View AnswerAnswer:

March 31, 2020 No Comments READ MORE +

What is the purpose of the file “@token_data” that cURL is handling?

Refer to the exhibit. The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?A . This file is a container to log possible error responses in the request.B . This file is given...

March 31, 2020 1 Comment READ MORE +

Which scheme is the server employing that causes this error?

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?A . rate limitingB . time outsC . cachingD . redirectionView AnswerAnswer: A

March 30, 2020 No Comments READ MORE +

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)A . publicly disclosed vulnerabilities related to the included dependenciesB . mismatches in coding styles and conventions in the included dependenciesC . incompatible licenses in the included dependenciesD . test...

March 30, 2020 No Comments READ MORE +

Which two data encoding techniques are supported by gRPC? (Choose two.)

Which two data encoding techniques are supported by gRPC? (Choose two.)A . XMLB . JSONC . ASCIID . ProtoBufE . YAMLView AnswerAnswer: BE

March 30, 2020 No Comments READ MORE +