How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

Refer to the exhibit. A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?A . two clusters; scratchB . three clusters; scratchC . three clusters; developmentD . two clusters; developmentView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?

Refer to the exhibit. Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?A . requests.get(url, links=[‘next’][‘url’])B . requests.get(url, headers=links[‘next’][‘url’])C . requests.get(res.links[‘next’][‘url’], headers=headers)D . requests.get(res.headers.get(‘Link”)[‘next’][‘url’], headers=headers)View AnswerAnswer: C

March 20, 2021 No Comments READ MORE +

In which directory is the YAML file with these variables found?

Refer to the exhibit. As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device. In which directory is the YAML file with these variables found?A . host_vars directoryB . home directoryC ....

March 20, 2021 No Comments READ MORE +

Which REST API call accomplishes this task?

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available...

March 20, 2021 No Comments READ MORE +

Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the Authorization Code Grant1 flow

DRAG DROP Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the Authorization Code Grant1 flow. View AnswerAnswer:

March 19, 2021 No Comments READ MORE +

Which statement is true?

The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?A . The ETag has a Strong validator directive.B . The ETag has a Weak validator directive, which is an optional directive.C . The ETag has a Weak validator directive, which is a mandatory directive.D . The...

March 19, 2021 No Comments READ MORE +

In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?A . resource serverB . resource ownerC . clientD . authorization serverView AnswerAnswer: A

January 6, 2021 No Comments READ MORE +

What is submitted when an SSL certificate is requested?

What is submitted when an SSL certificate is requested?A . PEMB . CRTC . DERD . CSRView AnswerAnswer: D

January 5, 2021 No Comments READ MORE +

Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used

DRAG DROP Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used. View AnswerAnswer: Explanation:

January 5, 2021 No Comments READ MORE +

Which statement about microservices architecture is true?

Which statement about microservices architecture is true?A . Applications are written in a single unit.B . It is a complex application composed of multiple independent parts.C . It is often a challenge to scale individual parts.D . A single faulty service can bring the whole application down.View AnswerAnswer: B

January 5, 2021 No Comments READ MORE +