Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Question and Answers

Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)

Last Update May 1, 2024
Total Questions : 114

We are offering FREE 300-910 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-910 free exam questions and then go for complete pool of Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) test questions that will help you more.

300-910 pdf

300-910 PDF

$38.5  $109.99
300-910 Engine

300-910 Testing Engine

$45.5  $129.99
300-910 PDF + Engine

300-910 PDF + Testing Engine

$59.5  $169.99
Questions 1

A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.

Which practice improves the consistency of the deployments?

Options:

A.  

Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored

B.  

Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository

C.  

In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.

D.  

Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently

Discussion 0
Questions 2

Refer to the exhibit.

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

Options:

A.  

Base Alter: TextMessage

B.  

Undefined: TextMessageBase

C.  

TextMessage -> Base

D.  

TextMessage -> Alter Base

Discussion 0
Questions 3

Refer to the exhibit.

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

Options:

A.  

Reject string values that are greater than maximum size

B.  

Use floating point instead of integer for rating to avoid overflow

C.  

Validate the content of the name and address parameters

D.  

Run the application in a Docker container

E.  

Compile the application using Java HotSpot

Discussion 0
Questions 4

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.

Why did the pipeline fail to start?

Options:

A.  

The CI server was not configured as a Git remote for the repository.

B.  

The webhook call from the code repository did not reach the CI server.

C.  

Configuration changes must be sent to the pipeline, which then updates the repository.

D.  

The pipeline must be started manually after the code repository is updated.

Discussion 0
Questions 5

What are two advantages of using Configuration Management Tools? (Choose two.)

Options:

A.  

reduction in policy violations caused by human errors

B.  

reduction in administration costs

C.  

reduction in network changes already performed automatically

D.  

reduction of on-premises networking equipment

E.  

reduction in networking team skills

Discussion 0
Questions 6

Which approach must be used to integrate DevOps practices into the team structure in an existing organization?

Options:

A.  

Create a team that can deliver all the stages with active cooperation between the team members

B.  

Create a team that can deliver all the stages with well-defined roles and a communication structure between team members

C.  

Create a team for each stage with structured communication channels

D.  

Create a team for each stage with active cooperation between the teams

Discussion 0
Questions 7

An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.

Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)

Options:

A.  

Changes must be scheduled to deploy at a specific time that has minimal traffic

B.  

Changes must include automated tests

C.  

Changes must be validated during deployment to the production environment

D.  

Smaller, individually testable changes must be merged first

E.  

Team members must be responsible for the code committed by any team member

Discussion 0
Questions 8

Refer to the exhibit.

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

Options:

A.  

Reverse lookup the IP address to add a hostname field

B.  

Convert the date to the time zone of the system

C.  

Configure the Linux machine to add a UID field to messages

D.  

Filter out the text of the message to speed up searches

Discussion 0
Questions 9

Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or less.

Drag and drop the code snippets from the bottom onto the blanks in the code to monitor the site and network health on a Cisco DNA Center platform instance. Options may be used more than once. Not all options are used.

Options:

Discussion 0
Questions 10

Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used

Options:

Discussion 0
Questions 11

What is the purpose of using a build tool in software development?

Options:

A.  

It complies source code into binaries and executables.

B.  

It provides a way to edit source code using a graphical interface.

C.  

It is a manual process that is followed to build software.

D.  

It tracks bugs and incidents in a built application.

Discussion 0
Questions 12

How does eliminating hardcoded or default passwords help to secure an environment?

Options:

A.  

helps by enforcing your password in a repository and storing it in a secure vault

B.  

helps to manage passwords centrally

C.  

helps penetration testing team to focus on other issues more efficiently

D.  

helps by removing back doors in your environments

Discussion 0
Questions 13

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

Options:

A.  

soak testing

B.  

unit testing

C.  

load testing

D.  

volume testing

Discussion 0
Questions 14

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Options:

Discussion 0
Questions 15

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

Options:

A.  

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.  

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.  

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.  

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Discussion 0
Questions 16

A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:

• Take a source Docker image named alpine

• Define two stages named build and push

• Check network connectivity before the stages run

• Fetch the latest Docker image

• Create a new Docker image and push it to the registry

• Tag the new Docker image as the latest version

Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.

Options:

Discussion 0
Questions 17

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.

Options:

Discussion 0
Questions 18

What are two reasons a Docker golden image should be updated? (Choose two.)

Options:

A.  

when there is a change to a username or password in the Docker secrets

B.  

when the application has a new release

C.  

when a fix for a security vulnerability is released

D.  

when a change is needed to an environment variable in the Dockerfile

E.  

when the base image is nearing the end of life

Discussion 0
Questions 19

The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.

Where in the interface does AppDynamics bring this to your attention?

Options:

A.  

Potential Issues section of an individual transaction

B.  

Transaction Score graph of a business transaction

C.  

Code Deadlock section of the Event List

D.  

Slow Calls and Errors tab of the application

Discussion 0
Questions 20

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)

Options:

A.  

performing code reviews

B.  

requirement gathering

C.  

change management process

D.  

new code scanning

E.  

rollback plans

Discussion 0
Questions 21

Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.

Options:

Discussion 0
Questions 22

What is the impact of using the Drone.io CI/CD tool on the local installation step?

Options:

A.  

slows down the development

B.  

delays the deployment of components

C.  

speeds up the procedure

D.  

complicates the application process

Discussion 0
Questions 23

Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?

Options:

A.  

encode the value with base64 in a secure DNS CTEXT entry

B.  

as an environment variable in the Dockerfile

C.  

Docker environment variable

D.  

Docker secrets

Discussion 0
Questions 24

A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.

Options:

A.  

source code analysis tools

B.  

dynamic applications security testing

C.  

Threat modeling

D.  

vulnerability management

Discussion 0
Questions 25

Refer to the exhibit A DevOps engineer is responsible for monitoring a mission-critical app During normal operations, when opening the application dashboard, it has been noticed that Ecom-Tier1 suddenly turns partially red Which action must be taken to address the Ecom-Tier1 turning red?

Options:

A.  

Restart the service to re-establish the connection with the nodes and clear the path.

B.  

Decrease the load on the MySQL databases to release the hardware resources available for node distribution

C.  

Check with the planning team to understand if the number of nodes in the Ecom tier can be increased to handle traffic

D.  

Contact the network team to investigate the network path that caused this intermittent issue around 9.10.

Discussion 0
Questions 26

A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?

Options:

A.  

Unit

B.  

End-to-end

C.  

A/B

D.  

sanity

Discussion 0
Questions 27

Drag and drop the code snippets from the bottom onto the boxes in the code in the Ansible playbook to restart multiple services in the correct sequence Not all options are used

Options:

Discussion 0
Questions 28

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

Options:

A.  

A hostgroup must be defined

B.  

The “_type” must represent the process type

C.  

The priority of the message must be to the server

D.  

The process name in the message must be parsed into a field

Discussion 0
Questions 29

A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?

Options:

A.  

Ansible

B.  

pyATS

C.  

Genie CLI

D.  

Travis CI

Discussion 0
Questions 30

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Options:

Discussion 0
Questions 31

Which two statements about Infrastructure as Code are true? (Choose two.)

Options:

A.  

Test-driven development practices make use of Infrastructure as Code.

B.  

Infrastructure as Code refers to automated testing libraries.

C.  

DevOps builds upon Infrastructure as Code.

D.  

Infrastructure as Code is based on practices from software development.

E.  

Infrastructure as Code must use the same programming language as the application.

Discussion 0
Questions 32

Refer to the exhibit.

An organization has issues with code-based failures after implementing a CI/CD pipeline to automate the builds and deployment phases of an application.

Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a successful continuous deployment?

Options:

A.  

Restructuring and monitoring tests must be run after it is promoted to production

B.  

Restructuring and monitoring tests must be run before it is promoted to production

C.  

Functional and nonfunctional tests must be run after it is promoted to production

D.  

Functional and nonfunctional tests must be run before it is promoted to production

Discussion 0
Questions 33

Refer to the exhibit.

Which action allows the development team to reach the deployed application?

Options:

A.  

Create an init container to initialize routes for the containers in the pod

B.  

Create a service to expose the logic running in the pod

C.  

Delete the deployment and redeploy by using a ReplicaSet.

D.  

Delete the deployment and redeploy by using the latest tag for the container image

Discussion 0
Questions 34

What is a principle of chaos engineering?

Options:

A.  

common user access on system monitoring infrastructure

B.  

proactive testing based on system responsiveness

C.  

prevent mistakes that cause infrastructure service disruption

D.  

reactive system monitoring for network infrastructure outages

Discussion 0
Questions 35

Which two actions help limit the attack surface of your Docker container? (Choose two.)

Options:

A.  

Run only a single service in each container.

B.  

Run all services in a single image.

C.  

Use version tags for base images and dependencies.

D.  

Use Kali Linux as a base image.

E.  

Download images over HTTPS supporting sites.

Discussion 0
Questions 36

A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.

Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

Options:

A.  

Store the access token with GitHub environment variables

B.  

Store the access token with GitHub encrypted secrets

C.  

Store the access token in an environment file in the repository

D.  

Hard code the access token in the repository with Base64 encoding

Discussion 0
Questions 37

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

Options:

A.  

The default path is not used.

B.  

The volume is not created.

C.  

The volume is created.

D.  

The volume is created with errors.

Discussion 0
Questions 38

What is included in ansible playbook instructions?

Options:

A.  

component dependencies

B.  

end state of component

C.  

machine dependencies

D.  

beginning state of component

Discussion 0
Questions 39

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

Options:

Discussion 0