Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update May 1, 2024
Total Questions : 114
We are offering FREE 300-910 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-910 free exam questions and then go for complete pool of Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) test questions that will help you more.
A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.
Which practice improves the consistency of the deployments?
Refer to the exhibit.
A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?
Refer to the exhibit.
An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.
Why did the pipeline fail to start?
What are two advantages of using Configuration Management Tools? (Choose two.)
Which approach must be used to integrate DevOps practices into the team structure in an existing organization?
An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.
Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)
Refer to the exhibit.
The text represents a syslog message sent from a Linux server to a centralized log system.
Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?
Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or less.
Drag and drop the code snippets from the bottom onto the blanks in the code to monitor the site and network health on a Cisco DNA Center platform instance. Options may be used more than once. Not all options are used.
Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used
How does eliminating hardcoded or default passwords help to secure an environment?
Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?
Fill in the blank to complete the statement.
A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:
• Take a source Docker image named alpine
• Define two stages named build and push
• Check network connectivity before the stages run
• Fetch the latest Docker image
• Create a new Docker image and push it to the registry
• Tag the new Docker image as the latest version
Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.
An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.
What are two reasons a Docker golden image should be updated? (Choose two.)
The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.
Where in the interface does AppDynamics bring this to your attention?
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)
Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.
What is the impact of using the Drone.io CI/CD tool on the local installation step?
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.
Refer to the exhibit A DevOps engineer is responsible for monitoring a mission-critical app During normal operations, when opening the application dashboard, it has been noticed that Ecom-Tier1 suddenly turns partially red Which action must be taken to address the Ecom-Tier1 turning red?
A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?
Drag and drop the code snippets from the bottom onto the boxes in the code in the Ansible playbook to restart multiple services in the correct sequence Not all options are used
Refer to the exhibit.
The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.
What causes the issue?
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.
Refer to the exhibit.
An organization has issues with code-based failures after implementing a CI/CD pipeline to automate the builds and deployment phases of an application.
Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a successful continuous deployment?
Refer to the exhibit.
Which action allows the development team to reach the deployed application?
Which two actions help limit the attack surface of your Docker container? (Choose two.)
A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.
Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
Refer to the exhibit.
A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.
Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.