单选题

What is an effective logging strategy according to the 12-factor app tenets?

A、 Tag and save logs in a local document database that has querying capabilities.
B、 Capture logs by the execution environment and route to a centralized destination.
C、 Timestamp and save logs in a local time-series database that has querying capabilities.
D、 Back up log files in a high-availability remote cluster on the public cloud.
下载APP答题
由4l***uz提供 分享 举报 纠错

相关试题

单选题 A developer is deploying an application to automate the configuration and management of Cisco network switches and routers. The application must use REST API interface to achieve

programmability. The security team mandates that the network must be protected against DDoS attacks. What mitigates the attacks without impacting genuine requests?

A、IP address filtering at the application layer
B、firewall on the network perimeter
C、API rate limiting at the application layer
D、traffic routing on the network perimeter

单选题 An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must be used for high performance for the data structure?

A、document-based
B、time series
C、columnar
D、graph

单选题 A developer must recommend an appropriate tool to deploy a configuration to hundreds of servers. The configuration management solution must meet these requirements:

•The servers must initiate the connection to obtain updates.

• The configuration must be defined in a declarative style

Which tool should be used?

A、Puppet
B、Terraform
C、Ansible
D、Chef

单选题 An engineer is developing a Docker container for an application in Python. For security reasons the application needs to be accessible on port 5001 only. Which line should be added to the Docker file in order to accomplish this?

A、EXPOSE 5001
B、PORT SRC 5001
C、ADD PORT 5001
D、ENTRYPOINT 5001

单选题 Which transport layer protocol does PC use to retrieve telemetry information?

A、SSH
B、SNMP
C、TCP
D、HTTP/2

单选题 What is a well-defined concept for GDP compliance?

A、Compliance standards apply to organizations that have a physical presence in Europe.
B、Data controllers must confirm to data subjects as to whether. where, and why personal data is being processed.
C、Personal data that was collected before the compliance standards were set do not need to be protected
D、Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

单选题 A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

A、A daemon to consume the Wireless Health endpoint of the Meraki Scanning API.
B、A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API.
C、A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API.
D、A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API.

单选题 An architect must optimize traffic that targets a popular API endpoint. Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays. Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?

A、curl GET request
B、curl HEAD request
C、curl -silent request
D、curl -H 'Cache-Control: no-cache' request