What is true about compilation? (Select two answers)
What is true about compilation? (Select two answers) It tends to be slower than interpretation The code is converted directly into machine code executable by the processor Both you and…
What is true about compilation? (Select two answers) It tends to be slower than interpretation The code is converted directly into machine code executable by the processor Both you and…
What is the expected behavior of the following program? print ("Hello!") The program will output ("Hello!") to the screen The program will output Hello! to the screen The program will…
What is CPython? It's a programming language that is a superset of the C language, designed to produce Python-like performance with code written in C It's a programming language that…
Which device acts as a termination point for cable runs and keeps cables secure and safely out of walkways? patch panel UTM KVM switch access point Explanation: Patch panels terminate…
What type of connector is used to connect an analog modem to a telephone line socket? RJ-11 RJ-45 BNC ST Explanation: For dial-up Internet service, the modem is connected to…
What is a feature of a dial-up connection? the use of an analog modem to transmit data over voice telephone lines the use of different frequencies to send multiple signals…
If the name of a shared directory is dirtest in an OceanStor 9000 storage system, local users who have permission can access the directory by entering \\*.*.*.*\dirtest, where *,*.*,* must…
In an AWS CloudFormation template, each resource declaration includes: a logical ID, a resource type, and resource properties a variable resource name and resource attributes an IP address and resource…
Which technology is used to containerize applications and allows them to run in a variety of environments? GitHub VirtualBox Docker Cisco DNA
What is a philosophy for software deployment used in the field of DevOps? SOAP CI/CD OWASP DevNet
What is a characteristic of a virtual machine running on a PC? A virtual machine needs a physical network adapter to connect to the Internet. A virtual machine runs its…
Match the OWASP resource with a description.
Which mitigation method is effective against cross-site scripting? requiring multifactor authentication using only necessary features and secure packages downloaded from official sources and verified with a signature sanitizing untrusted content…
Which characters are used to separate batched SQL statements? parentheses ( ) semicolons ; pound signs # colons :
What is a characteristic of the blue-green upgrade deployment strategy? The code changes are periodically rolled out in such a way that they do not impact current users. The new…
Which statement is a characteristic of the broken access control threat to web applications? It allows attackers to access, and potentially change, serialized versions of data and objects. It allows…
Match the cloud model to its description. (Not all options are used.)
Which attack involves the insertion of malicious code into SQL statements? local file inclusion SQL injection brute force cross-site scripting
Which security device is used to make responses to client requests look like they all come from the same server? forward proxy reverse proxy stateful firewall jump box
What is used to isolate the different parts of a running container? namespaces control groups wrappers union file systems