A web application is susceptible to cross-site scripting. Which two methods allow this issue to be mitigated? (Choose two.)
An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)
Refer to the exhibit.
Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?
A)
B)
C)
D)
A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:
• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud
• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery
• Maintain steady-state environments
Which configuration management solution must the developer use?