practice exam Flashcards
A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown:
#!/bin/bash
The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.
The script file has specific commands that are preceded by the pound sign (#) and should not be executed.
The commands within the script fie are to have the output stored in the /bin/bash directory.
The script file has commands that need to be run in the bash shell.
The script file has commands that need to be run in the bash shell.
An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?
public
edge
private
hybrid
edge
What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)
Viptela
Brakeman
VisualCodeGrepper
Docker
Bandit
VIRL
Brakeman
VisualCodeGrepper
Bandit
A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build:
node {
stage(‘Preparation’) {
catchError(buildResult: ‘SUCCESS’) {
sh ‘docker stop samplerunning’
sh ‘docker rm samplerunning’
}
}
stage(‘Build’) {
build ‘BuildAppJob’
}
stage(‘Results’) {
build ‘TestAppJob’
}
}
After saving the job, what should the engineer do next?
Test the script in Docker.
Run the job.
Open the Recent Changes option to verify the results of the job.
Manually run the samplerunning container.
Run the job.
What are three ways to mitigate SQL injection threats? (Choose three.)
stored procedures configured with the “db_owner” rights set as default
stateless packet-filtering firewalls
dynamic queries
database firewalls
whitelist input validation
parameterized database queries
database firewalls
whitelist input validation
parameterized database queries
What is the purpose of adding salt to the password hashing process?
to decrease password complexity
to increase the length of a password
to make hashed passwords deterministic
to create a unique hash for every password
to create a unique hash for every password
Match the CI/CD software development philosophy with a description.
The application development process is performed in short sprints so that enough code is always in a deployable state.
Choices:
continuous delivery
continuous deployment
continuous integration
continuous delivery
Match the CI/CD software development philosophy with a description.
The changes from all developers are continually merged with the main branch of the existing application.
Choices:
continuous delivery
continuous deployment
continuous integration
continuous integration
Match the CI/CD software development philosophy with a description.
Once changes are tested and integrated with the main branch they are tested again and then deployed to production.
Choices:
continuous delivery
continuous deployment
continuous integration
continuous deployment
What is an operational characteristic of the local version control system?
It locks a file once it is checked out by a user to prevent modification by others.
It pushes a working copy of a file to a main repository after individuals have made changes.
It allows multiple individuals to edit a working copy of a file at the same time.
It stores a delta of two versions of a file as opposed to the file itself.
It stores a delta of two versions of a file as opposed to the file itself.
An organization is using the Waterfall methodology for a software development project. In what order are the SDLC phases completed when using this method?
requirements and analysis, design, testing, implementation, deployment, maintenance
requirements and analysis, design, implementation, testing, deployment, maintenance
requirements and analysis, design, implementation, deployment, testing, maintenance
requirements and analysis, design, deployment, testing, implementation, maintenance
requirements and analysis, design, implementation, testing, deployment, maintenance
In which phase of the SDLC process does the product development team gather feedback from the potential customer on the desired features for the new software?
design
deployment
implementation
requirements and analysis
requirements and analysis
Which Git command is used to get an initial copy on an existing Git repository for the first time?
git add
git copy
git clone
git repo
git clone
Refer to the exhibit. Which message format is being used?
{“edit-config”:
{
“default-operation”:”merge”,
“test-operation”:”set”,
“some-integers”: [2,3,5,7,9],
“a-boolean”: true,
“more-numbers”: [2.2E+2,-1.0735],
}
}
JSON
HTML
YAML
XML
JSON
A student is learning Python using the interactive interpreter mode. The student issues these commands:
> > > class Url():
… def __init__(self, host, prot):
… self.host = host
… self.prot = prot
… self.url = self.prot + “://” + self.host
…
Which type of Python structure is created?
a method
a class
a function
a module
a class
Match the Git stage with a description.
contains the file copies that can be modified and are only visible to the user of the client
choices:
repository
working directory
staging area
working directory