Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Cisco Certified DevNet Professional > 300-910

300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Question and Answers

Question # 4

A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?

A.

Unit

B.

End-to-end

C.

A/B

D.

sanity

Full Access
Question # 5

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:

• the CI/CD pipeline to spin up test instances.

• instances must be used to validate changes.

• changes must be validated prior to a continuous deployment workflow, and

• then push the changes to production

How should the pipeline target the required environment?

A.

Use separate CI servers for each environment

B.

Use different pipelines for each environment

C.

Use separate Git repositories for each environment

D.

Use different inventory files for each environment

Full Access
Question # 6

Refer to the exhibit.

How does the architecture respond to a usage spike?

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

C.

The Orchestrator increases the resources assigned to containers to increase performance

D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

Full Access
Question # 7

Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used

Full Access
Question # 8

Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?

A.

AMQP

B.

SNMP

C.

SSH

D.

REST

Full Access
Question # 9

How does eliminating hardcoded or default passwords help to secure an environment?

A.

helps by enforcing your password in a repository and storing it in a secure vault

B.

helps to manage passwords centrally

C.

helps penetration testing team to focus on other issues more efficiently

D.

helps by removing back doors in your environments

Full Access
Question # 10

Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

A.

Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.

B.

Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.

C.

Use only software modules that are written by the internal team.

D.

Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.

E.

Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

Full Access
Question # 11

Refer to the exhibit.

Which CI solution uses this file?

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jenkins

Full Access
Question # 12

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.

Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

A.

Grafana has lost connectivity to Prometheus, which causes graphs to display only the cached data.

B.

CPU and memory metrics from Kubernetes nodes are not accurate due to the way that containers share resources.

C.

Some containers are crashing regularly and being restarted automatically by Kubernetes.

D.

The metricbeat agent has crashed and is no longer sending new data to Prometheus, so the metrics are not updating.

Full Access
Question # 13

Which two actions help limit the attack surface of your Docker container? (Choose two.)

A.

Run only a single service in each container.

B.

Run all services in a single image.

C.

Use version tags for base images and dependencies.

D.

Use Kali Linux as a base image.

E.

Download images over HTTPS supporting sites.

Full Access
Question # 14

Which Docker command is used to start an interactive Bash shell in a running container named “test”?

A.

docker attach -it test /bin/bash

B.

docker run -it test /bin/bash

C.

docker exec -it test /bin/bash

D.

docker run test /bin/bash

Full Access
Question # 15

Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.

Full Access
Question # 16

What is an advantage of using configuration management tools to automate infrastructure services?

A.

eliminates the need to run integration tests within the CI/CD pipeline

B.

provides high native monitoring of services

C.

eliminates the need for CI/CD tools

D.

integrates with container orchestration

Full Access
Question # 17

Which Dockerfile yields the most predictable builds?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Refer to the exhibit.

What is causing the requests code to fail?

A.

Rython3 is not compatible with requests.

B.

The requests library is not imported.

C.

The requests library is not installed.

D.

The requests coming into stdin fail because device_ip cannot be parsed.

Full Access
Question # 19

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

Full Access
Question # 20

An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.

Which command validates the success of the application deployment?

A.

kubectl get pods -o wide -w

B.

kubectl rollout status deployment

C.

kubectl describe pods/

D.

kubectl rollout history deployment

Full Access
Question # 21

An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?

A.

secrets

B.

sane defaults

C.

application parameters

D.

config maps

Full Access
Question # 22

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Full Access
Question # 23

What is chaos engineering?

A.

designing an application with fuzzy logic that makes it hard to predict

B.

a product engineering approach that lacks a formal methodology

C.

splitting a project between teams that do not communicate with each other

D.

introducing problems into a system to study behavior and improve reliability

Full Access
Question # 24

Refer to the exhibit.

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

A.

Base Alter: TextMessage

B.

Undefined: TextMessageBase

C.

TextMessage -> Base

D.

TextMessage -> Alter Base

Full Access
Question # 25

Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.

Full Access
Question # 26

What is a practice of infrastructure as code?

A.

Use multiple version control systems

B.

Document as much as possible

C.

Configure the deployment consistently

D.

Test, integrate, and deploy once a day

Full Access
Question # 27

A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.

Which deployment strategy must be used?

A.

rolling

B.

blue/green

C.

shadow

D.

canary

Full Access
Question # 28

Fill in the blanks to complete the statement.

When creating multiple containers, in order to allow communication with each other, you must create a_____________ of type_____________.

Full Access
Question # 29

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Full Access
Question # 30

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)

A.

node

B.

app

C.

agent

D.

tier

E.

event

Full Access
Question # 31

Refer to the exhibit.

What are the properties of the load balancer in a Kubernetes environment?

A.

Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

B.

Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

C.

Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

D.

Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp

Full Access
Question # 32

The IaC configuration for an application is being deployed using a CI/CD pipeline. Drag and drop the steps for this pipeline from the left into the correct order that they would be executed on the right. Not all options are used.

Full Access
Question # 33

What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?

A.

cost

B.

metrics and monitoring

C.

hardware maintenance

D.

credentials management

Full Access
Question # 34

A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)

A.

Apply

B.

Install

C.

Deploy

D.

Create

E.

Expose

Full Access
Question # 35

Refer to the exhibit.

A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?

A.

The CI/CD system is configured incorrectly to import the dependencies to the code

B.

The code is pushed incorrectly to the CI/CD system

C.

The version of Python is wrong in the CI/CD pipeline

D.

The CI/CD system is configured incorrectly to download the required dependencies

Full Access
Question # 36

Refer to the exhibit.

Which CI solution uses this file?

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jentans

Full Access
Question # 37

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.

Why did the pipeline fail to start?

A.

The CI server was not configured as a Git remote for the repository.

B.

The webhook call from the code repository did not reach the CI server.

C.

Configuration changes must be sent to the pipeline, which then updates the repository.

D.

The pipeline must be started manually after the code repository is updated.

Full Access
Question # 38

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.

Which approach accomplishes this goal?

A.

Give the accounts used in the CI/CD pipeline full administrative rights to all applications

B.

Use the same passwords across the entire CI/CD pipeline

C.

Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline

D.

Never use one-time passwords in CI/CD pipeline

Full Access
Question # 39

What is a benefit of Infrastructure as Code for the cloud?

A.

It groups system downtime across the infrastructure

B.

It enables the user to automate deployments

C.

It does not require configuration.

D.

It is a cost effective solution for services

Full Access