Untitled Deck Flashcards
Which four modifications to Josh’s backup utility would you implement to meet her requirements? (choose 4)
A. Leverage the Python asyncio library to support backup multiple devices concurrently.
B. Update the Python environment used for the backup tool. To Python 3 and run the scripts as it is to migrate code.
C. Add an optional argument to the script for “—device” to limit backup jobs. Run to justify to just identify devices.
D. Compare the checksum from the last stored backup to the latest one before saving to disk.
E. Use 2to3 automatically update the script score code to support Python 3 syntax.
F. Split the network inventory into four pieces and run an instance of the backup script for each piece.
G. Check the configuration last modified time on the device and skip if there has been no change since the last successful backup.
Answer: A, C, E, G
Based on the challenges Sara is having, which three recommendations would you make for changes to her PPM workflows? Choose three.
A. Create a pre-added hook to run the formatting and style checkers to verify code quality.
B. Create a bunch of branches for each major version of a tool and tag each minor release on that branch.
C. Create a new feature branch based on the current main branch and merge in your changes.
D. Consider rebasing your feature branch from the main and run all tests prior to merging.
E. Create a pre commit hook to run the formatting and style checks to verify quote code quality.
F. Major, minor version releases of tools should be tagged and maintained on the main branch.
Answer: B, D, E
Which recommendation would you suggest to Josh’s related to her request for feedback on testing needs?
A. Perform integration testing to check if different modules work correctly under heavy when combined as a group.
B. Implement testing to ensure that framework functions correctly under heavy load and numerous simultaneously requests.
C. Implement systems verification testing to ensure that the various modules function correctly with one another.
D. Perform testing to ensure that each framework component operates correctly as independent unit.
E. Implement a set of paths and tests that they perform to examine the several different user flows through the modules.
Answer: B
What is not a suggestion for scalability testing that you would recommend as Sara?
A. Using a baseline of 10 requests per second, find the number of users the system can concurrently support.
B. Each test iteration must begin with verification of base functionality of system before scale testing begins.
C. Measure request to response time for all the tasks to track impact on the application performance and not just look for failure.
D. An order of magnitude 10 times increasing steps. Find the maximum number of requests per second supported by a single user.
Answer: B
What 3 architecture decisions for software upgrade process which satisfy the giving requirements? Choose three.
A. Task queues should be used to decouple HTTP request processing from the code responsible for the software upgrades.
B. Spawn tasks workers for software upgrades on-demand and the cloud, e.g., using serverless.
C. Task workers which perform software upgrades should be distributed across the sites.
D. Perform the software upgrades on one device at a time to minimize the risk as much as possible.
E. Software upgrades to redundant pairs of switches should be done only on one of two devices at a time.
F. The application should perform software upgrades on all devices at once to reduce total execution time.
G. Have several task workers perform software update concentrated in the central data center.
H. Software upgrade should be done seriously synchronously to HTTP requests processing inside Flask view to maximize this system complexity.
Answer: A, C, E
Which three options must be considered when designing a telemetry strategy for Carl and Merrill, Mary? Choose 3.
A. Data normalization schema.
B. Data modeling schema type.
C. Telemetry protocol.
D. Subscription configuration mode.
E. Data encoding.
F. Data flow direction.
Answer: C, D, E
Which networking mode exposes all ports from the container as is to the underlying host?
B. Exposes all ports from the container as is to the underlying host.
Answer: Host networking.
Which networking mode requires to explicitly list host: container port mappings?
A. Requires to explicitly list host: container port mappings.
Answer: Bridge Networking.
Which two approaches would you recommend to improve input validation? Choose 2.
A. Add a CAPTCHA to each web page where users enter data.
B. Create a fuzzing service that periodically hits the front end with bad data.
C. Escape invalid characters from text input fields.
D. Use prepared statements when inserting the data into the database, even after input validation is performed.
E. Duplication, client-side validation checks and the server-side code.
Answer: D, E
Which recommendation would you make to call and the leadership team to Defy gravity could take advantage of the hybrid cloud architecture?
A. District reliance of defy gravity to be complete operational for operations makes it a poor choice for our cloud project.
B. Deploy application tiers within public cloud, private cloud, and a plant location in parallel.
C. Install automated coordination machine engines within the closest public cloud region or zone to head to each plant.
D. Install a data service satellite on premises at each plant for data security.
E. Deploy front end 2.0 at each public and private cloud location with users directed to service based on network conditions.
Answer: E
Which set of features will Mike and her OPS team want to consider implementing in their script to achieve her goals?
A. HTTP methods, proposed data store, validate, transaction, lock.
B. HTTP methods, candidates store, verify config, batch, lock.
C. HTTP methods, Proposed data store, validate, commit, release.
D. RPC’s, candidate database data store, verify config, transaction, release.
E. RPC’s, proposed data store, validate, batch, release.
F. RPC’s, candidate data store, validate, transaction, lock.
Answer: F
What HTTP methods are not responsible for rush comp?
GET, PATCH, PUT, DELETE, POST.
How do you remove the primary IP address assigned to a physical interface?
Use the DELETE method.
How do you look up the current primary IP address assigned to a physical interface?
Use the GET method.
How do you change the primary IP address assigned to a physical interface that has one configured?
Use the PATCH or PUT method.
How do you configure the primary IP address assigned to a physical interface that currently has no IP address configured?
Use the PATCH or PUT method.
What is one suggestion for Sam regarding sensitive data in the YAML file?
Sensitive data should be provided as environment variables.
What are three pieces of data included in Mary’s CSR Baseline requirements?
Elliptic curve parameter file, elliptic curve length of 256 bits, common name of *.ops.pm.example.com.
What are the characteristics of Elliptical curve cryptography?
Asymmetric cryptographic algorithm, provides protection against man in the middle attacks, recommended key length between 160 and 521 bits.
What are the characteristics of RSA?
Older, more established algorithm, known to be broken with short key lengths, recommended key length greater than 1024 bits.
What are five design recommendations for creating Ansible roles?
Combine network connection-specific playbooks, combine platform-specific playbooks, group configuration steps by network features, define default values for variables, standardize on variable names.
What approach should be recommended for finding problem commits and testing them independently?
Use ‘git bisect good|bad’ to track down problem commits and git cherry-pick ‘HASH_FROM_BISECT’ for testing.
Which of Sam’s Netconf payload snippets are valid?
Option C.
Which two NETCONF request payloads are valid with respect to Yang model snippets?
Option B and Option C.