Win IT Exam with Last Dumps 2024


Cisco 200-901 Exam

Page 19/28
Viewing Questions 181 190 out of 272 Questions
67.86%

Question 181
A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?




Question 182
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:
$ docker tag 84fe411926287 local/app:0.4
Which command must be executed next to build the Docker image using the tag?




Question 183
Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)




Question 184
What is a benefit of using a code review process in application development?




Question 185
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?





Question 186
Refer to the exhibit. An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?
Image 200-901_186Q.png related to the Cisco 200-901 Exam




Question 187
What is a benefit of a distributed version control system?




Question 188
A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?




Question 189
What is a procedural component of CI/CD pipelines?




Question 190
Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?








Premium Version