Wednesday 4 November 2020

Get Cisco 200-901 Dumps PDF - DumpsResources.com

 Question: 1 

Which type of threat occurs when an attacker can send hostile data to an interpreter within an application? 

A. Cross-site scripting 

B. Sensitive data exposure 

C. Broken authentication 

D. Injection  

Answer: D     

Question: 2

Which two statements describe the role of an artifact repository in a CI/CD pipeline? (Choose two.) 

A. An artifact repository allows us to compare and merge changes in the source code of files involved in a build process. 

B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure. 

C. An artifact repository provides traceability, search, and management of binary files. 

D. An artifact repository is needed only for managing open-source software. E. An artifact repository stores file needed and generated during the build process. 


Answer: CE   

Question: 3

What is the purpose of the Cisco VIRL software tool? 

 A. To verify configurations against compliance standards 

B. To simulate and model networks 

C. To automate API workflows 

D. To test the performance of an application 

Answer: B 

Question: 4

Which detail is included in a routing table? 

A. IP protocol 

B. Broadcast address 

C. TCP or UDP port number 

D. Destination next hop or outgoing interface  

Answer: C     

Question: 5 

Which mechanism is used to consume a RESTful API design when large amounts of data are returned? 

A. Data sets 

B. Scrolling 

C. Blobs 

D. Pagination 

Answer: D     

Source:

https://dumpsresources.com/200-901-dumps-pdf

0 comments:

Post a Comment