Cisco 200-901 Practice Test - Questions Answers, Page 11
List of questions
Related questions
What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)
specifically designed for container-based workloads
suitable for legacy applications that do not support virtualization
provides workloads with access to hardware features
not compatible with other cloud services such as PaaS or SaaS offerings
provides the hypervisor to host virtual servers
A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?
virtual machine
virtual Python environment
container
bare metal
Refer to the exhibit.
What is the action of the Bash script that is shown?
For all directories in the current folder, the script goes into the directory and makes a new directory.
The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.
The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.
The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.
When using the Bash shell, how is the output of the devnet command saved to a file named “output.txt”?
devnet > output.txt
devnet | output.txt
devnet < output.txt
devnet & output.txt
After a project is migrated to a new codebase, the “old_project” directory must be deleted. This directory has multiple readonly flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?
rmdir -p old_project
rm -rf old_project
rm -r old_project
rmdir old_project
What is a benefit of using edge computing in an IoT implementation?
high speed in data processing
low network design complexity
low cost in network design
high availability for network components
What is the benefit of edge computing?
It reduces network latency by moving processing closer to the data source.
It reduces data velocity from devices or other data sources.
It simplifies security as devices and processing are brought closer together.
It removes the need for centralized data processing.
Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?
sensitive data exposure
broken authentication
cross-site scripting
injection
A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?
multi
private
hybrid
public
Refer to the exhibit.
Which OWASP threat does this example demonstrate?
broken access control
cross-site scripting
SQL injection
man-in-the-middle
Question