Which statement about microservices architecture is true?
Which statement about microservices architecture is true?A . Applications are written in a single unit.B . It is a complex application composed of multiple independent parts.C . It is often a challenge to scale individual parts.D . A single faulty service can bring the whole application down.View AnswerAnswer: B
Where should application configuration be stored?
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?A . environment variablesB . YAML filesC . Python librariesD . DockerfilesE . INI filesView AnswerAnswer: B
Which two methods are API security best practices? (Choose two.)
Which two methods are API security best practices? (Choose two.)A . Use tokens after the identity of a client has been established.B . Use the same operating system throughout the infrastructure.C . Use encryption and signatures to secure data.D . Use basic auth credentials over all internal API interactions.E ....
Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits
DRAG DROP Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits. View AnswerAnswer:
What is the purpose of the file “@token_data” that cURL is handling?
Refer to the exhibit. The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?A . This file is a container to log possible error responses in the request.B . This file is given...
Which scheme is the server employing that causes this error?
A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?A . rate limitingB . time outsC . cachingD . redirectionView AnswerAnswer: A
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)A . publicly disclosed vulnerabilities related to the included dependenciesB . mismatches in coding styles and conventions in the included dependenciesC . incompatible licenses in the included dependenciesD . test...
Which two data encoding techniques are supported by gRPC? (Choose two.)
Which two data encoding techniques are supported by gRPC? (Choose two.)A . XMLB . JSONC . ASCIID . ProtoBufE . YAMLView AnswerAnswer: BE
Which two actions can improve the design of the application to identify the faults?
An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which...
from the master and then incorporate that feature branch into the master
DRAG DROP Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master. View AnswerAnswer: