What could they try to improve their ability to produce an Increment for the next Sprint?
The Scrum Teams in a Nexus find they have simply too much work each Sprint to do to deliver a valuable and useful Increment. What could they try to improve their ability to produce an Increment for the next Sprint? (choose the best answer)A . Reduce the amount of work...
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)A . Block cipherB . HashingC . Private keyD . Perfect forward secrecyE . SaltingF . Symmetric keysView AnswerAnswer: B, C Explanation: Non-repudiation is the ability to ensure that a party cannot deny a previous...
Which log type would provide information about traffic blocked by a Zone Protection profile?
Which log type would provide information about traffic blocked by a Zone Protection profile?A . Data FilteringB . IP-TagC . TrafficD . ThreatView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClhzCACD is the correct answer because the threat log type would provide information about traffic blocked by a Zone Protection profile. This is because...
Which of the following job types are supported by Cloud Dataproc (select 3 answers)?
Which of the following job types are supported by Cloud Dataproc (select 3 answers)?A . HiveB . PigC . YARND . SparkView AnswerAnswer: ABD Explanation: Cloud Dataproc provides out-of-the box and end-to-end support for many of the most popular job types, including Spark, Spark SQL, PySpark, MapReduce, Hive, and Pig...
Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)
Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)A . Distributed Denial of Service Protection (DDoS)B . Zero Trust Network Access (ZTNA)C . Cloud Access Security Broker (CASB)D . Unified Threat Management (UTM)View AnswerAnswer: BC Explanation: Secure Access...
Which endpoints should the Enrichment Cloud Functions call?
You are designing an architecture with a serverless ML system to enrich customer support tickets with informative metadata before they are routed to a support agent. You need a set of models to predict ticket priority, predict ticket resolution time, and perform sentiment analysis to help agents make strategic decisions...
Which behavior should an administrator expect when performing the Veritas InfoScale Availability online upgrade process using the installer?
Which behavior should an administrator expect when performing the Veritas InfoScale Availability online upgrade process using the installer?A . The cluster remains online and the kernel processes are swapped during the upgrade process.B . The cluster is taken offline one node at a time during the package upgrade.C . The...
What variable tag must be included in an email to allow prospects to manage their email preferences?
What variable tag must be included in an email to allow prospects to manage their email preferences?A . %%opt_out%% or %%email_preference_center%%B . %%unsubscribe %% or %% email_preference_ center %%C . %%opt_out%% report_spam %%D . %%unsubscribe % or %% opt_out %%View AnswerAnswer: B Explanation: According to the Salesforce documentation, the variable...
Which field name appears in the results?
A field alias has been created based on an original field. A search without any transforming commands is then executed in Smart Mode. Which field name appears in the results?A . Both will appear in the All Fields list, but only if the alias is specified in the search.B ....
What should you recommend?
You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder. What should you recommend?A . From the Microsoft 365 compliance center, configure a DLP policy.B . From the Microsoft 365 compliance center, configure a Content Search query.C . From the...