Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-910 Sample Questions Answers

Questions 4

A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?

Options:

A.

recreate

B.

blue/green

C.

rolling

D.

canary

Buy Now
Questions 5

What is the impact of using the Drone.io CI/CD tool on the local installation step?

Options:

A.

slows down the development

B.

delays the deployment of components

C.

speeds up the procedure

D.

complicates the application process

Buy Now
Questions 6

An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?

Options:

A.

secrets

B.

sane defaults

C.

application parameters

D.

config maps

Buy Now
Questions 7

Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

Options:

A.

Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.

B.

Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.

C.

Use only software modules that are written by the internal team.

D.

Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.

E.

Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

Buy Now
Questions 8

The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.

Where in the interface does AppDynamics bring this to your attention?

Options:

A.

Potential Issues section of an individual transaction

B.

Transaction Score graph of a business transaction

C.

Code Deadlock section of the Event List

D.

Slow Calls and Errors tab of the application

Buy Now
Questions 9

Refer to the exhibit.

How should the Jenkins job be troubleshooted based on the error provided?

Options:

A.

Verify what the responding file created.

B.

Update pip.

C.

Install dependencies.

D.

Place the code in a container and run the job again.

Buy Now
Questions 10

Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.

Options:

Buy Now
Questions 11

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)

Options:

A.

Service instances must be isolated from one another.

B.

Service must be independently deployable and scalable.

C.

Service are written using the same languages, frameworks, and framework versions.

D.

Service must be dependent, deployable, and scalable.

E.

Service instances do not need to be isolated from one another.

Buy Now
Questions 12

Refer to the exhibit.

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

Options:

A.

Change from a JDBC call to a HTTP call to retrieve data faster

B.

Run the AccountProfileMySQL service in Kubernetes

C.

Explore the JDBC queries looking for optimization opportunities

D.

Verify if the Docker container running MySQL is limiting CPU utilization

Buy Now
Questions 13

What is a benefit of Infrastructure as Code for the cloud?

Options:

A.

It groups system downtime across the infrastructure

B.

It enables the user to automate deployments

C.

It does not require configuration.

D.

It is a cost effective solution for services

Buy Now
Questions 14

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.

Why did the pipeline fail to start?

Options:

A.

The CI server was not configured as a Git remote for the repository.

B.

The webhook call from the code repository did not reach the CI server.

C.

Configuration changes must be sent to the pipeline, which then updates the repository.

D.

The pipeline must be started manually after the code repository is updated.

Buy Now
Questions 15

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

Options:

A.

The default path is not used.

B.

The volume is not created.

C.

The volume is created.

D.

The volume is created with errors.

Buy Now
Questions 16

Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?

Options:

A.

AMQP

B.

SNMP

C.

SSH

D.

REST

Buy Now
Questions 17

A developer is containerizing an application. The container "devnetprotf' has been run in detached mode to output the container ID with the command

Which command must be used to start an interactive Bash she« m the running container?

Options:

A.

docker exec -it 1b487caec32a /bin/bash

B.

docker exec -it devnetprod /bin/bash

C.

doctor run -it devnetprod /bin/bash

D.

docker run -it 1b48caec32a /bin/bash

Buy Now
Questions 18

A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.

Options:

A.

source code analysis tools

B.

dynamic applications security testing

C.

Threat modeling

D.

vulnerability management

Buy Now
Questions 19

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

Options:

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Buy Now
Questions 20

An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.

Which command validates the success of the application deployment?

Options:

A.

kubectl get pods -o wide -w

B.

kubectl rollout status deployment

C.

kubectl describe pods/

D.

kubectl rollout history deployment

Buy Now
Questions 21

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

Options:

A.

Remove the failing test.

B.

Manually deploy the change into the production environment

C.

Use a backup pipeline

D.

Replicate the production environment in the pipeline before applying

Buy Now
Questions 22

Refer to the exhibit.

An application for data storing and processing has been created. The application is time-sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application.

Which action will help resolve the errors?

Options:

A.

Rewrite the SQL query identified in the transaction to be more efficient

B.

Log in to the node directly and investigate the errors by reviewing log files

C.

Drill down to investigate and identify the errors

D.

Scale out the node horizontally

Questions 23

A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?

Options:

A.

Unit

B.

End-to-end

C.

A/B

D.

sanity

Buy Now
Questions 24

Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.

Options:

Buy Now
Questions 25

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Options:

Buy Now
Questions 26

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

Options:

Buy Now
Questions 27

What is the purpose of using a build tool in software development?

Options:

A.

It complies source code into binaries and executables.

B.

It provides a way to edit source code using a graphical interface.

C.

It is a manual process that is followed to build software.

D.

It tracks bugs and incidents in a built application.

Buy Now
Questions 28

A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.

Which practice improves the consistency of the deployments?

Options:

A.

Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored

B.

Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository

C.

In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.

D.

Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently

Buy Now
Questions 29

Refer to the exhibit.

How does the architecture respond to a usage spike?

Options:

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

C.

The Orchestrator increases the resources assigned to containers to increase performance

D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

Buy Now
Questions 30

Which step must be taken to enable centralized logging in a Kubernetes environment?

Options:

A.

No steps need to be taken. The master node automatically aggregates logs from all worker nodes and stores them on the specified persistent volume.

B.

Create a CustomResourceDefinition in each deployment that specifies the IP or names the log collector.

C.

Deploy a sidecar node that aggregates logs from the entire cluster.

D.

Create a DaemonSet that deploys a container with a logging agent on every node in the cluster.

Buy Now
Questions 31

Refer to the exhibit.

The exhibit shows the output of an Ansible task that prints the contents of the

show_ip_int_brief variable that was registered in a different task in the playbook.

Which expression is used to print the output of the command without its header row?

Options:

A.

show_ip_int_brief[‘stdout_lines’][0]

B.

show_ip_int_brief[‘stdout_lines’][1:]

C.

show_ip_int_brief[‘stdout_lines’][0][1:]

D.

show_ip_int_brief[‘stdout_lines’]

Buy Now
Questions 32

Refer to the exhibit.

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

Options:

A.

Reject string values that are greater than maximum size

B.

Use floating point instead of integer for rating to avoid overflow

C.

Validate the content of the name and address parameters

D.

Run the application in a Docker container

E.

Compile the application using Java HotSpot

Buy Now
Questions 33

Refer to the exhibit.

Which CI solution uses this file?

Options:

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jenkins

Buy Now
Questions 34

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

Options:

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Buy Now
Questions 35

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.

Options:

Buy Now
Questions 36

What are two reasons a Docker golden image should be updated? (Choose two.)

Options:

A.

when there is a change to a username or password in the Docker secrets

B.

when the application has a new release

C.

when a fix for a security vulnerability is released

D.

when a change is needed to an environment variable in the Dockerfile

E.

when the base image is nearing the end of life

Buy Now
Questions 37

Refer to the exhibit.

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

Options:

A.

Reverse lookup the IP address to add a hostname field

B.

Convert the date to the time zone of the system

C.

Configure the Linux machine to add a UID field to messages

D.

Filter out the text of the message to speed up searches

Buy Now
Questions 38

Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.

In which file should the name of the middleware server be configured?

Options:

A.

Docker Service discovery daemon

B.

Docker Swarm

C.

Docker Compose

D.

Dynamic Host Configuration Protocol

Buy Now
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Apr 24, 2024
Questions: 114
$68  $169.99
$52  $129.99
$44  $109.99
buy now 300-910