A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?
What is the impact of using the Drone.io CI/CD tool on the local installation step?
An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?
Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)
The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.
Where in the interface does AppDynamics bring this to your attention?
Refer to the exhibit.
How should the Jenkins job be troubleshooted based on the error provided?
Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.
Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)
Refer to the exhibit.
A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.
Which action resolves the issue?
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.
Why did the pipeline fail to start?
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?
A developer is containerizing an application. The container "devnetprotf' has been run in detached mode to output the container ID with the command
Which command must be used to start an interactive Bash she« m the running container?
A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.
Refer to the exhibit.
The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.
What causes the issue?
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.
Which command validates the success of the application deployment?
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
Refer to the exhibit.
An application for data storing and processing has been created. The application is time-sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application.
Which action will help resolve the errors?
A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?
Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.
Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.
Refer to the exhibit.
A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.
Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.
A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.
Which practice improves the consistency of the deployments?
Which step must be taken to enable centralized logging in a Kubernetes environment?
Refer to the exhibit.
The exhibit shows the output of an Ansible task that prints the contents of the
show_ip_int_brief variable that was registered in a different task in the playbook.
Which expression is used to print the output of the command without its header row?
Refer to the exhibit.
An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.
Refer to the exhibit.
The text represents a syslog message sent from a Linux server to a centralized log system.
Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?
A)
B)
C)
D)
A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.
In which file should the name of the middleware server be configured?