November 18, 2020

BCBA Board Certified Behavior Analyst Exam

 

BCBA
The purpose of the Board Certified Behavior Analyst® (BCBA®) examination is to assess knowledge of the BCBA/BCaBA Task List (4th ed.) at a level consistent with that of an entry-level behavior analyst. Before taking the BCBA examination, you must apply to the BACB and provide the requested documentation showing that you have met all eligibility requirements.

The BCBA examination is comprised of 160 multiple-choice questions, 10 of which are ungraded pilot questions. Each question has four possible answers. You have four hours to complete the examination.

Complete applications* are accepted on a continual basis. When your application for initial certification is approved, you will receive an "authorization to test" email, which will include scheduling instructions. Once you receive that email, you may schedule your certification examination online with Pearson Vue and select a date, time, and location that works for you.

*A completed application includes:
Full payment received
Online application submitted and complete
All supporting documents (e.g., university transcript, Experience Verification Forms) and any additional documentation (e.g., degree equivalency evaluation documentation, coursework evaluation documentation, degree evaluation documentation) received.

Content Development
The BCBA examination reflects the best practices in behavior analysis. Industry experts develop the examination, which is based on the results of a formal Job Task Analysis. The BACB follows nationally accepted standards for test development that include the use of subject matter experts and extensive surveys.

QUESTION 1
A behavior analyst is adhering to which underlying assumption of behavior analysis when she conducts several tests of her treatment before she writes it in a formal behavior program?

A. Determinism
B. Law of parsimony
C. Empiricism
D. None of the above

Correct Answer: C

QUESTION 2
Providing a complete description of one’s procedures in a behavior analytic study of classroom management techniques is adhering to which dimensions of behavior analysis?

A. Conceptually systematic
B. Applied
C. Technological
D. Analytic

Correct Answer: A

QUESTION 3
Describing behavior program procedures in terms of the basic principles of behavior is adhering to which dimension of behavior analysis?

A. Conceptually systematic
B. Applied
C. Technological
D. Analytic

Correct Answer: A

QUESTION 4
When asked why a certain behavior happened, the behavior analyst states that the behavior “came out of nowhere.” If the behavior analyst meant what he said, he is violating the assumption of
__________________.

A. Philosophical doubt
B. Determinism
C. Technological
D. Being conceptually systematic

Correct Answer: A

QUESTION 5
Which of the following is NOT a dimension of applied behavior analysis?

A. Effective
B. Technological
C. Applied
D. Empirical

Correct Answer: D

QUESTION 6
A behavior analyst is measuring the time it takes for a client to say, “You’re welcome” after the staff says,
“Thank you.” The behavior analyst is measuring __________________.

A. Frequency
B. Duration
C. Inter-response time
D. Latency

Correct Answer: D

QUESTION 7
Which measure would probably be the best measure for crying?

A. Frequency
B. Duration
C. Percentage
D. Latency

Correct Answer: B

Actualkey BCBA Exam pdf, Certkingdom BCBA PDF

MCTS Training, MCITP Trainnig

Best BCBA Certification, BCBA Training at certkingdom.com

November 17, 2020

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR 350-901) Exam

 

Exam overview
This exam tests your knowledge of software development and design, including:

Using APIs
Cisco platforms
Application deployment and security
Infrastructure and automation

Exam Description:
Developing Applications using Cisco Core Platforms and APIs v1.0 (DEVCOR 350-901)is a 120-minute exam associated with the DevNet Professional Certification. This exam tests acandidate's knowledge of software development and design including using APIs, Cisco platforms,application deployment and security, and infrastructure and automation. The course, DevelopingApplications using Cisco Core Platforms and APIs helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 Software Development and Design
1.1 Describe distributed applications related to the concepts of front-end, back-end, and load balancing
1.2 Evaluate an application design considering scalability and modularity
1.3 Evaluate an application design considering high-availability and resiliency (including on-premises, hybrid, and cloud)
1.4 Evaluate an application design considering latency and rate limiting
1.5 Evaluate an application design and implementation considering maintainability
1.6 Evaluate an application design and implementation considering observability
1.7 Diagnose problems with an application given logs related to an event
1.8 Evaluate choice of database types with respect to application requirements (such as relational, document, graph, columnar, and Time Series)
1.9 Explain architectural patterns (monolithic, services oriented, microservices, and event driven)
1.10 Utilize advanced version control operations with Git
1.10.a Merge a branch
1.10.b Resolve conflicts
1.10.c git reset
1.10.d git checkout
1.10.e git revert
1.11 Explain the concepts of release packaging and dependency management
1.12 Construct a sequence diagram that includes API calls

20% 2.0 Using APIs
2.1 Implement robust REST API error handling for time outs and rate limits
2.2 Implement control flow of consumer code for unrecoverable REST API errors
2.3 Identify ways to optimize API usage through HTTP cache controls
2.4 Construct an application that consumes a REST API that supports pagination
2.5 Describe the steps in the OAuth2 three-legged authorization code grant flow
2019 Cisco Systems, Inc. This document is Cisco Public. Page 2

20% 3.0 Cisco Platforms

3.1 Construct API requests to implement chatops with Webex Teams API
3.2 Construct API requests to create and delete objects using Firepower device management (FDM)
3.3 Construct API requests using the Meraki platform to accomplish these tasks
3.3.a Use Meraki Dashboard APIs to enable an SSID
3.3.b Use Meraki location APIs to retrieve location data
3.4 Construct API calls to retrieve data from Intersight
3.5 Construct a Python script using the UCS APIs to provision a new UCS server given a template
3.6 Construct a Python script using the Cisco DNA center APIs to retrieve and display wireless health information
3.7 Describe the capabilities of AppDynamics when instrumenting an application
3.8 Describe steps to build a custom dashboard to present data collected from Cisco APIs

20% 4.0 Application Deployment and Security

4.1 Diagnose a CI/CD pipeline failure (such as missing dependency, incompatible versions of components, and failed tests)
4.2 Integrate an application into a prebuilt CD environment leveraging Docker and Kubernetes
4.3 Describe the benefits of continuous testing and static code analysis in a CI pipeline
4.4 Utilize Docker to containerize an application
4.5 Describe the tenets of the "12-factor app"
4.6 Describe an effective logging strategy for an application
4.7 Explain data privacy concerns related to storage and transmission of data
4.8 Identify the secret storage approach relevant to a given scenario
4.9 Configure application specific SSL certificates
4.10 Implement mitigation strategies for OWASP threats (such as XSS, CSRF, and SQL injection)
4.11 Describe how end-to-end encryption principles apply to APIs

20% 5.0 Infrastructure and Automation
5.1 Explain considerations of model-driven telemetry (including data consumption and data storage)
5.2 Utilize RESTCONF to configure a network device including interfaces, static routes, and VLANs (IOS XE only)
5.3 Construct a workflow to configure network parameters with:
5.3.a Ansible playbook
5.3.b Puppet manifest
5.4 Identify a configuration management solution to achieve technical and business requirements
5.5 Describe how to host an application on a network device (including Catalyst 9000 and Cisco IOx-enabled devices)

QUESTION 1
A developer has created an application based on customer requirements. The customer needs to run the
application with the minimum downtime. Which design approach regarding high-availability applications,
Recovery Time Objective, and Recovery Point Objective must be taken?

A. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data
centers must be timely to allow seamless request flow.
B. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data
centers does not need to be timely to allow seamless request flow.
C. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers
does not need to be timely to allow seamless request flow.
D. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers
must be timely to allow seamless request flow.

Correct Answer: A

QUESTION 2
A cloud native project is being worked on in which all source code and dependencies are written in Python,
Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.
Which step should be omitted from the pipeline?

A. Deploy the code to one or more environments, such as staging and/or production.
B. Build one of more containers that package up code and all its dependencies.
C. Compile code.
D. Run automated tests to validate the correctness.


QUESTION 3
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

A. Application code writes its event stream to stdout.
B. Application log streams are archived in multiple replicated databases.
C. Application log streams are sent to log indexing and analysis systems.
D. Application code writes its event stream to specific log files.
E. Log files are aggregated into a single file on individual nodes.

Correct Answer: AD

QUESTION 4
An organization manages a large cloud-deployed application that employs a microservices architecture. No
notable issues occur with downtime because the services of this application are redundantly deployed over
three or more data center regions. However, several times a week reports are received about application
slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and
then spin up brand new.
Which action must be taken to improve the resiliency design of the application while maintaining current scale?

A. Update the base image of the containers.
B. Test the execution of the application with another cloud services platform.
C. Increase the number of containers running per service.
D. Add consistent “try/catch(exception)” clauses to the code.

Correct Answer: D

Actualkey Cisco 350-901 Exam pdf, Certkingdom Cisco 350-901 PDF

MCTS Training, MCITP Trainnig

Best Cisco 350-901 Certification, Cisco 350-901 Training at certkingdom.com

November 16, 2020

300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (300-910 DEVOPS) Exam

 

Exam Description:
Implementing DevOps Solutions and Practices using Cisco Platforms v1.0 (DEVOPS 300-910) is a 90-minute exam associated with the DevNet Professional Certification. This exam tests a candidate's knowledge of DevOps practices as it pertains to deployment automation that enables automated configuration, management, and scalability of cloud microservices and infrastructure processes on Cisco platforms. The course, Implementing DevOps Solutions and Practices using Cisco Platforms, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 CI/CD Pipeline
1.1 Describe characteristics and concepts of build /deploy tools such as Jenkins, Drone, or Travis CI
1.2 Identify the sequence, components, and integrations to implement a CI/CD pipeline for a given scenario
1.3 Troubleshoot issues with a CI/CD pipeline such as code-based failures, pipeline issues, and tool incompatibility
1.4 Identify tests to integrate into a CI/CD pipeline for a given scenario
1.5 Identify release deployment strategy (canary, rollbacks, and blue/green) for a given scenario
1.6 Diagnose code dependency management issues including API, tool chain, and libraries

15% 2.0 Packaging and Delivery of Applications
2.1 Identify the steps to containerize an application
2.2 Identify steps to deploy multiple microservice applications
2.3 Evaluate microservices and container architecture diagrams based on technical and business requirements (security, performance, stability, and cost)
2.4 Identify safe handling practices for configuration items, application parameters, and secrets
2.5 Construct a Docker file to address application specifications
2.6 Describe the usage of golden images to deploy applications

20% 3.0 Automating Infrastructure
3.1 Describe how to integrate DevOps practices into an existing organization structure
3.2 Describe the use of configuration management tools to automate infrastructure services such as Ansible, Puppet, Terraform, and Chef
3.3 Construct an Ansible playbook to automate an application deployment of infrastructure services
3.4 Construct a Terraform configuration to automate an application deployment of infrastructure services
3.5 Describe the practice and benefits of Infrastructure as Code
3.6 Design a pre-check validation of the network state in a CI/CD pipeline for a given scenario
3.7 Design a pre-check validation of the application infrastructure in a CI/CD pipeline for a given scenario
3.8 Describe the concepts of extending DevOps practices to the network for NetDevOps
3.9 Identify the requirements such as memory, disk I/O, network, and CPU needed to scale the application or service

15% 4.0 Cloud and Multicloud
4.1 Describe the concepts and objects of Kubernetes
4.2 Deploy applications to a Kubernetes cluster
4.3 Utilize objects of Kubernetes to build a deployment to meet requirements
4.4 Interpret the pipeline for continuous delivery of a Drone configuration file
4.5 Validate the success of an application deployment on Kubernetes
4.6 Describe method and considerations to deploy an application to multiple environments such as multiple cloud providers, high availability configurations, disaster recovery configurations, and testing cloud portability
4.7 Describe the process of tracking and projecting costs when consuming public cloud
4.8 Describe benefits of infrastructure as code for repeatable public cloud consumption
4.9 Compare cloud services strategies (build versus buy)

20% 5.0 Logging, Monitoring, and Metrics
5.1 Identify the elements of log and metric systems to facilitate application troubleshooting such as performance issues and streaming telemetry logs
5.2 Implement a log collection and reporting system for applications
5.2.a aggregate logs from multiple related applications
5.2.b search capabilities
5.2.c reporting capabilities
5.3 Troubleshoot a distributed application using AppDyanmics with Application Performance Monitoring
5.4 Describe the principles of chaos engineering
5.5 Construct Python scripts that use APIs to accomplish these tasks
5.5.a build a monitoring dashboard
5.5.b notify Webex Teams space
5.5.c responding to alerts and outages
5.5.d creating notifications
5.5.e health check monitoring
5.5.f opening and closing incidents
5.6 Identify additional application requirements to provide visibility into application health and performance
5.7 Describe Kubernetes capabilities related to logging, monitoring, and metrics
5.8 Describe the integration of logging, monitoring and alerting in a CI/CD pipeline design
2019 Cisco Systems, Inc. This document is Cisco Public. Page 3

10% 6.0 Security
6.1 Identify methods to secure an application and infrastructure during production and testing in a CI/CD pipeline
6.2 Identify methods to implement a secure software development life cycle

QUESTION 1
A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

A. Jenkins
B. Genie CLI
C. Travis CI
D. Python YAML data libraries

Correct Answer: A

QUESTION 2
Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

A. Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.
B. Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.
C. Use only software modules that are written by the internal team.
D. Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.
E. Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

Correct Answer: AE

QUESTION 3
A CI/CD pipeline that builds infrastructure components using Terraform must be designed.
A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory.
It also checks the existing state of the defined infrastructure.
Which command does the pipeline run to accomplish this goal?

A. terraform plan
B. terraform check
C. terraform fmt
D. terraform validate

Correct Answer: D
 

Actualkey Cisco 300-910 Exam pdf, Certkingdom Cisco 300-910 PDF

MCTS Training, MCITP Trainnig

Best Cisco 300-910 Certification, Cisco 300-910 Training at certkingdom.com

November 8, 2020

JN0-635 Security, Professional (JNCIP-SEC) Exam

 

Exam Details
JNCIP-SEC exam topics are based on the content of the recommended instructor-led training courses, as well as the additional resources.

Exam code: JN0-635
Written exam
Administered by Pearson VUE
Exam length: 120 minutes
Exam type: 65 multiple choice questions
Pass/fail status is available immediately

Exam Objectives
This list provides a general view of the skill set required to successfully complete the specified certification exam.

Describe the concepts, operation, or functionality of firewall filters and ACLs
Selective packet processing
Troubleshooting with firewall filters
Filter-based forwarding

Given a scenario, demonstrate how to configure, troubleshoot, or monitor firewall filters

Given a scenario, demonstrate how to troubleshoot or monitor security policies or security zones
Tools
Logging and tracing
Other outputs

Describe the concepts, operation, or functionality of Juniper ATP
Collectors
Custom rules
Mitigation

Given a scenario, demonstrate how to configure or monitor Juniper ATP

Describe the concepts, operation, or functionality of edge security features
Hardware support
SecIntel
IPS
Corero DDoS mitigation
ATP

Describe the concepts or operation of security compliance

RBAC
Security Director
AAA and SAML integration

Describe the concepts, operation, or functionality of threat mitigation
Malware identification or mitigation
Malicious lateral traffic identification or mitigation
Zero trust micro segmentation

Given a scenario, demonstrate how to configure or monitor threat mitigation

Describe the concepts, operation, or functionality of the logical systems
Administrative roles
Security profiles
LSYS communication

Describe the concepts, operation, or functionality of the tenant systems
Master and tenant admins
TSYS capacity

Describe the concepts, operation, or functionality of Layer 2 security
Transparent mode
Mixed mode
Secure wire
MACsec

Given a scenario, demonstrate how to configure or monitor Layer 2 security

Describe the concepts, operation, or functionality of advanced NAT functionality
Persistent NAT
DNS doctoring
IPv6 NAT

Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced NAT scenarios

Describe the concepts, operation, or functionality of advanced IPsec application
Remote access VPNs
Hub-and-spoke VPNs
PKI
ADVPNs
Routing with IPsec
Overlapping IP addresses
Dynamic gateways
IPsec CoS

Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced IPsec functionality

Preparation
The resources listed on this section are recommended, but do not guarantee passing scores on JNCP exams. Success depends on each candidate’s motivation, experience, and dedication. Candidates may find additional resources not listed on this page helpful as well.

QUESTION 1
Your organization has multiple Active Directory domains to control user access. You must ensure that security policies are passing traffic based upon the users’ access rights.
What would you use to assist your SRX Series devices to accomplish this task?

A. JATP Appliance
B. JIMS
C. JSA
D. Junos Space

Correct Answer: B


QUESTION 2
You are asked to set up notifications if one of your collector traffic feeds drops below 100 kbps.
Which two configuration parameters must be set to accomplish this task? (Choose two.)

A. Set a traffic SNMP trap on the JATP appliance
B. Set a logging notification on the JATP appliance
C. Set a general triggered notification on the JATP appliance
D. Set a traffic system alert on the JATP appliance

Correct Answer: BD

QUESTION 3
You have configured static NAT for a webserver in your DMZ. Both internal and external users can reach the
webserver using the webserver’s IP address. However, only internal users can reach the webserver using the
webserver’s DNS name. When external users attempt to reach the webserver using the webserver’s DNS name, an error message is received.
Which action would solve this problem?

A. Disable Web filtering
B. Use DNS doctoring
C. Modify the security policy
D. Use destination NAT instead of static NAT

Correct Answer: B

QUESTION 4
Which interface family is required for Layer 2 transparent mode on SRX Series devices?

A. LLDP
B. Ethernet switching
C. inet
D. VPLS

Correct Answer: B

Actualkey Juniper JNCIP-SEC JN0-635 Exam pdf, Certkingdom Juniper JNCIP-SEC JN0-635 PDF

MCTS Training, MCITP Trainnig

Best Juniper JNCIP-SEC JN0-635 Certification, Juniper JNCIP-SEC JN0-635 Training at certkingdom.com

Bookmark and Share