Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Exam Practice Test

Page: 1 / 11
Total 114 questions

Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.

If an attacker gains access to the scripts, what is the risk exposure?

Options:

A.

The Automation server is at risk of being compromised.

B.

The Ansible scripts run through encrypted SSH connections.

C.

The internal network is at risk of being compromised.

D.

The entire CI/CD-related infrastructure is at risk.

Question 2

Refer to the exhibit.

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

Options:

A.

Change from a JDBC call to a HTTP call to retrieve data faster

B.

Run the AccountProfileMySQL service in Kubernetes

C.

Explore the JDBC queries looking for optimization opportunities

D.

Verify if the Docker container running MySQL is limiting CPU utilization

Question 3

Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)

Options:

A.

It runs unit tests against code that is committed.

B.

It builds your software on the production environment.

C.

It builds your software when changes are committed.

D.

It builds your software every 500 milliseconds.

E.

It must have a plug-in for Puppet and Maven.

Question 4

What is a benefit of monitoring the CI/CD pipeline?

Options:

A.

troubleshoots distributed systems performance

B.

proactively deploys new servers if needed

C.

analyzes network outages that affect the network and server infrastructure

D.

provides insight into how efficiently the development team is operating

Question 5

An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.

Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)

Options:

A.

Changes must be scheduled to deploy at a specific time that has minimal traffic

B.

Changes must include automated tests

C.

Changes must be validated during deployment to the production environment

D.

Smaller, individually testable changes must be merged first

E.

Team members must be responsible for the code committed by any team member

Question 6

Drag and drop the code from the bottom onto the box where the code is missing to create a Terraform configuration that builds the network environment for a multitier software application. More EPG, Contract, and Filter definitions have been removed from the code.

Options:

Question 7

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)

Options:

A.

performing code reviews

B.

requirement gathering

C.

change management process

D.

new code scanning

E.

rollback plans

Question 8

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)

Options:

A.

node

B.

app

C.

agent

D.

tier

E.

event

Question 9

Refer to the exhibit.

How does the architecture respond to a usage spike?

Options:

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

C.

The Orchestrator increases the resources assigned to containers to increase performance

D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

Question 10

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

Options:

A.

Add a unit test to block the secrets

B.

Add a precommit Git hook to block the secrets

C.

Add dast to the repository to block the secrets

D.

Add a job in the CI build to block the secrets

Question 11

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)

Options:

A.

Service instances must be isolated from one another.

B.

Service must be independently deployable and scalable.

C.

Service are written using the same languages, frameworks, and framework versions.

D.

Service must be dependent, deployable, and scalable.

E.

Service instances do not need to be isolated from one another.

Question 12

What is a capability of node-level logging in Kubernetes?

Options:

A.

Using the Kubernetes JSON logging driver enables log persistence

B.

Output that is written to stdin is retrieved by using kubectl

C.

Output that is written to stderr is not logged or retrievable by using kubectl

D.

Using the local logging driver of Docker enables log persistence

Question 13

Which Dockerfile yields the most predictable builds?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?

Options:

A.

encode the value with base64 in a secure DNS CTEXT entry

B.

as an environment variable in the Dockerfile

C.

Docker environment variable

D.

Docker secrets

Question 16

When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?

Options:

A.

Add a step to run the debug ip routing command before the change, and add a step after the change to

issue the no debug ip routing command.

B.

Add a step to capture the routing table before the change, and add a step after the change to capture it again. Calculate the difference between the two for review.

C.

Add a step to ping a host on each of the static routes before the change, and a step after to repeat the same check. Calculate the difference between the two checks for review.

D.

Add a step to run the same playbook again with the debug option enabled and use grep on the log output to ensure that the commands are not applied again.

Question 17

Refer to the exhibit.

What is the reason for this error message?

Options:

A.

The required dependencies for the urllib3 module are not installed.

B.

The requests module is not installed.

C.

The required dependencies for the requests module are not installed.

D.

The site-packages directory has been corrupted.

Question 18

What is included in ansible playbook instructions?

Options:

A.

component dependencies

B.

end state of component

C.

machine dependencies

D.

beginning state of component

Question 19

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Options:

Question 20

A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?

Options:

A.

recreate

B.

blue/green

C.

rolling

D.

canary

Question 21

What are two reasons a Docker golden image should be updated? (Choose two.)

Options:

A.

when there is a change to a username or password in the Docker secrets

B.

when the application has a new release

C.

when a fix for a security vulnerability is released

D.

when a change is needed to an environment variable in the Dockerfile

E.

when the base image is nearing the end of life

Question 22

Which approach must be used to integrate DevOps practices into the team structure in an existing organization?

Options:

A.

Create a team that can deliver all the stages with active cooperation between the team members

B.

Create a team that can deliver all the stages with well-defined roles and a communication structure between team members

C.

Create a team for each stage with structured communication channels

D.

Create a team for each stage with active cooperation between the teams

Question 23

A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:

• Take a source Docker image named alpine

• Define two stages named build and push

• Check network connectivity before the stages run

• Fetch the latest Docker image

• Create a new Docker image and push it to the registry

• Tag the new Docker image as the latest version

Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.

Options:

Question 24

Refer to the exhibit A DevOps engineer must deploy two microservices The deployment must be installed in a new Kubernetes cluster. The microservices currently run in Docker and are managed by using the provided docker-compose yml file Drag and drop the steps from the left into order on the right to successfully deploy the microservices

Options:

Question 25

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

Options:

A.

Remove the failing test.

B.

Manually deploy the change into the production environment

C.

Use a backup pipeline

D.

Replicate the production environment in the pipeline before applying

Question 26

Drag and drop the scenarios from the left onto the cloud strategy categories on the right.

Options:

Question 27

Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

Options:

A.

Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.

B.

Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.

C.

Use only software modules that are written by the internal team.

D.

Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.

E.

Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

Question 28

Which description of a canary deployment is true?

Options:

A.

deployment by accident

B.

deployment that is rolled back automatically after a configurable amount of minutes

C.

deployment relating to data mining development

D.

deployment to a limited set of servers or users

Question 29

A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?

Options:

A.

EXPOSE 8080

B.

FIREWALL ADD-PORT 8080

C.

PORT 8080

D.

OPEN PORT 8080

Question 30

Refer to the exhibit.

A docker-compose.yml file implements a postgres database container.

Which .gitlab-ci.yml code block checks the health status of the container and stops the pipeline if the container is unhealthy?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

What is the purpose of using a build tool in software development?

Options:

A.

It complies source code into binaries and executables.

B.

It provides a way to edit source code using a graphical interface.

C.

It is a manual process that is followed to build software.

D.

It tracks bugs and incidents in a built application.

Question 32

A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.

Which command does the pipeline run to accomplish this goal?

Options:

A.

terraform plan

B.

terraform check

C.

terraform fmt

D.

terraform validate

Question 33

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

Options:

A.

Use self-developed algorithms for encryption

B.

Install virtual firewalls

C.

Actively change the ISP provider

D.

Apply all the latest patches and updates

Question 34

What are two testing scenarios of the chaos engineering principle? (Choose two.)

Options:

A.

maxing out CPU cores on an Elasticsearch cluster

B.

removing all users from a version control system

C.

executing routine in driver code to emulate I/O errors

D.

blocking developers’ building access

E.

unplugging a core switch device

Question 35

Refer to the exhibit.

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

Options:

A.

Base Alter: TextMessage

B.

Undefined: TextMessageBase

C.

TextMessage -> Base

D.

TextMessage -> Alter Base

Question 36

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.

Which approach accomplishes this goal?

Options:

A.

Give the accounts used in the CI/CD pipeline full administrative rights to all applications

B.

Use the same passwords across the entire CI/CD pipeline

C.

Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline

D.

Never use one-time passwords in CI/CD pipeline

Question 37

A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?

Options:

A.

ENTRYPOINT

B.

ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]

C.

ENTRYPOINT [“BACKGROUND”, “-D”, “/usr/sbin/apache2ctl”]

D.

ENTRYPOINT {usr/sbin/apache2ctl}

Question 38

The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.

Where in the interface does AppDynamics bring this to your attention?

Options:

A.

Potential Issues section of an individual transaction

B.

Transaction Score graph of a business transaction

C.

Code Deadlock section of the Event List

D.

Slow Calls and Errors tab of the application

Question 39

An IT team plans to deploy a new service built on top of an existing service. The capacity needed for the new service is difficult to estimate because the demand for the new service is undetermined. The team has these deployment requirements:

• A subset of the users of the original service must be migrated to the new service based on their profile

• The new service must be rolled back easily if capacity exceeds estimates

Which deployment strategy must be used?

Options:

A.

rolling

B.

blue/green

C.

geolocation

D.

canary

Page: 1 / 11
Total 114 questions