单选题 What is an effective logging strategy according to the 12-factor app tenets?
相关试题
单选题 A developer is deploying an application to automate the configuration and management of Cisco network switches and routers. The application must use REST API interface to achieve programmability. The security team mandates that the network must be protected against DDoS attacks. What mitigates the attacks without impacting genuine requests?
单选题 An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must be used for high performance for the data structure?
单选题 A developer must recommend an appropriate tool to deploy a configuration to hundreds of servers. The configuration management solution must meet these requirements: •The servers must initiate the connection to obtain updates. • The configuration must be defined in a declarative style Which tool should be used?
单选题 An engineer is developing a Docker container for an application in Python. For security reasons the application needs to be accessible on port 5001 only. Which line should be added to the Docker file in order to accomplish this?
单选题 Which transport layer protocol does PC use to retrieve telemetry information?
单选题 What is a well-defined concept for GDP compliance?
单选题 A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?
单选题 An architect must optimize traffic that targets a popular API endpoint. Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays. Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?