Search Header Logo

devnet practice final 1-49

Authored by Nobody Nobody

Computers

University

Used 4+ times

devnet practice final 1-49
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown:

#!/bin/bash

  • The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.

  • The script file has specific commands that are preceded by the pound sign (#) and should not be executed.

  • The commands within the script fie are to have the output stored in the /bin/bash directory.

The script file has commands that need to be run in the bash shell

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?

  • edge

  • public

  • private

  • hybrid

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)

  • Brakeman

  • Viptela

  • VisualCodeGrepper

  • Docker

  • Bandit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build:

After saving the job, what should the engineer do next?

  • Manually run the samplerunning container.

  • Open the Recent Changes option to verify the results of the job.

  • Test the script in Docker.

  • Run the job.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three ways to mitigate SQL injection threats? (Choose three.)

  • stateless packet-filtering firewalls

  • database firewalls

  • stored procedures configured with the “db_owner” rights set as default

  • whitelist input validation

  • parameterized database queries

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding salt to the password hashing process?

  • to create a unique hash for every password

  • to make hashed passwords deterministic

  • to increase the length of a password

  • to decrease password complexity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an operational characteristic of the local version control system?

  • It allows multiple individuals to edit a working copy of a file at the same time.

  • It stores a delta of two versions of a file as opposed to the file itself.

  • It locks a file once it is checked out by a user to prevent modification by others.

  • It pushes a working copy of a file to a main repository after individuals have made changes.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers