28% OFF Automatically For You
Developing Applications using Cisco Core
Platforms and APIs v1.0
Refer to the exhibit above and click on the resource tabs in the top left corner to view
resources to help with this question.
A developer is creating a Python Script that will use the Webex Teams REST API to
automatically create a new collaboration space with him and his team leads on-
demand via a Linux terminal command.
Drag and drop the code snippets from the left onto the numbers on the right that
match the missing sections in the exhibit to complete the script. Not all code snippets
Drag and drop the steps from the left into the correct sequence on the right to
describe how to use Git to maintain the current HEAD and revert back to a previous
commit, while undoing all intermediate commits.
Drag and drop the characteristics from the left onto the correct data processing
techniques on the right, in the context of GDPR.
4.Which two strategies are used to protect personally identifiable information?
A. Encrypt data in transit.
B. Encrypt hash values of data.
C. Encrypt data at rest.
D. Only hash usernames and passwords for efficient lookup.
E. Only encrypt usernames and passwords for efficient lookup.
5.Refer to the exhibit.
As part of the Ansible playbook workflow, several new interfaces are being configured
using the netconf_config module. The task references the interface variables that are
unique per device.
In which directory is the YAML file with these variables found?
A. host_vars directory
B. home directory
C. group_vars directory
D. current working directory
6.Which two techniques protect against injection attacks? (Choose two.)
A. input validation
B. trim whitespace
C. limit text areas to 255 characters
D. string escaping of user free text and data entry
E. only use dropdown, checkbox, and radio button fields
Refer to the