

Version:17.0
Question:1
Whichtypeof threat occur whenanattacker cansendhostiledatatoaninterpreter withinan application?

A.Cross-sitescripting
B.Sensitivedataexposure
C.Brokenauthentication
D.Injection
Answer:D
Explanation:
Reference:https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection
Question:2
Refertotheexhibit.
WhatistheeffectofthisAnsibleplaybookonanIOSrouter?
A.AnewrunningconfigurationispushedtotheIOSrouter.
B.ThecurrentrunningconfigurationoftheIOSrouterisbackedup.
C.Thestart-upconfigurationoftheIOSrouteriscopiedtoalocalfolder.
D.Anewstart-upconfigurationiscopiedtotheIOSrouter.
Answer:B
Explanation:
Question:3
WhichtwostatementdescribetheroleofanartifactrepositoryinaCI/CDpipeline?(Choosetwo.)
A.Anartifactrepositoryallowstocompareandmergechangesinthesourcecodeoffilesinvolvedina buildprocess.
B.AnartifactrepositoryisneededonlyforCI/CDpipelineexecutedonapubliccloudinfrastructure.
C.Anartifactrepositoryprovidestraceability,search,andmanagementofbinaryfiles.
D.Anartifactrepositoryisneededonlyformanagingopensourcesoftware.
E.Anartifactrepositorystoresfilesneededandgeneratedduringthebuildprocess.
Answer:CE
Explanation:
Question:4
DRAGDROP
Draganddropthenetworkcomponentnamesfromtheleftontothecorrectdescriptionsontheright. Notalloptionsareused.
Explanation:
1–A,2–B,3–D,4–C
Question:5
WhatisthepurposeoftheCiscoVIRLsoftwaretool?

A.Toverifyconfigurationsagainstcompliancestandards

B.Tosimulateandmodelnetworks
C.ToautomateAPIworkflows
Answer:
D.Totestperformanceofanapplication

Explanation:
Reference:https://www.speaknetworks.com/cisco-virl-better-gns3/
Answer:B
200-901 dumps pdf