Which type of threat occur when an attacker can send hostile data to an interpreter within an
application?
A. Cross-site scripting
B. Sensitive data exposure
C. Broken authentication
D. Injection
Answer: D
Question: 2
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)
A. An artifact repository allows to compare and merge changes in the source code of files involved in a build process.
B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.
C. An artifact repository provides traceability, search, and management of binary files.
D. An artifact repository is needed only for managing open source software.
E. An artifact repository stores files needed and generated during the build process.
Answer: CE
Question: 3
What is the purpose of the Cisco VIRL software tool?
A. To verify configurations against compliance standards
B. To simulate and model networks
C. To automate API workflows
D. To test performance of an application
Answer: B
Question: 4
Which detail is included in a routing table?
A. IP protocol
B. Broadcast address
C. TCP or UDP port number
D. Destination next hop or outgoing interface
Answer: C
Question: 5
Which mechanism is used to consume a RESTful API design when large amounts of data are
returned?
A. Data sets
B. Scrolling
C. Blobs
D. Pagination
Answer: D