Question: 1
Refer to the exhibit A script returns the location of a specific access point when given the access point name If a user enters a search value such as DROP TABLE access points then the entire table is removed. What must be added to the box where the code is missing to prevent a SQL injection attack?
A)
B)
C)
D)
Question: 2
An application has these characteristics
* provide one service or function
* distributed database
* API gateway
* central repository for code
* configuration database
* uses session management
Which two design approaches contribute to the scalability of the application'? (Choose two )
Question: 3
Refer to the exhibit.
The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request'
Question: 4
Refer to the exhibit. The JSON response is received from the Meraki location API. Which parameter is missing?
Question: 5
Refer to the exhibit. Which command resolves the merge conflict by removing the previous commit from the commit history?