Free 200-901 Exam Braindumps (page: 48)

Page 47 of 132

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

  1. 22
  2. 23
  3. 80
  4. 443
  5. 880

Answer(s): A,D



What is a benefit of using a code review process in application development?

  1. accelerates the deployment of new features in an existing application
  2. provides version control during code development
  3. enables the quick deployment of new code
  4. eliminates common mistakes during development

Answer(s): D



Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

  1. phishing
  2. DoS
  3. brute force attack
  4. CSRF

Answer(s): D



Refer to the exhibit.



An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

  1. hybrid
  2. virtual machines
  3. containers
  4. bare metal

Answer(s): B






Post your Comments and Discuss Cisco® 200-901 exam with other Community members:

200-901 Discussions & Posts