Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-910 Questions and Answers

Question # 6

Refer to the exhibit A DevOps engineer must deploy two microservices The deployment must be installed in a new Kubernetes cluster. The microservices currently run in Docker and are managed by using the provided docker-compose yml file Drag and drop the steps from the left into order on the right to successfully deploy the microservices

Full Access
Question # 7

Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.

Full Access
Question # 8

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Full Access
Question # 9

Which description of a canary deployment is true?

A.

deployment by accident

B.

deployment that is rolled back automatically after a configurable amount of minutes

C.

deployment relating to data mining development

D.

deployment to a limited set of servers or users

Full Access
Question # 10

A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.

Which practice improves the consistency of the deployments?

A.

Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored

B.

Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository

C.

In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.

D.

Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently

Full Access
Question # 11

Refer to the exhibit.

What is causing the requests code to fail?

A.

Rython3 is not compatible with requests.

B.

The requests library is not imported.

C.

The requests library is not installed.

D.

The requests coming into stdin fail because device_ip cannot be parsed.

Full Access
Question # 12

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.

Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

A.

Grafana has lost connectivity to Prometheus, which causes graphs to display only the cached data.

B.

CPU and memory metrics from Kubernetes nodes are not accurate due to the way that containers share resources.

C.

Some containers are crashing regularly and being restarted automatically by Kubernetes.

D.

The metricbeat agent has crashed and is no longer sending new data to Prometheus, so the metrics are not updating.

Full Access
Question # 13

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A.

Dynamic Application Security Testing

B.

Runtime Application Health-Protection

C.

Continuous Application Security Testing

D.

Static Analysis Security Testing

Full Access
Question # 14

Drag and drop the operations from the left into the correct order on the right when using CI/CD, assuming that there are no failures or conflicts.

Full Access
Question # 15

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Full Access
Question # 16

An interface on a router as a Layer 3 link has been configured to another device by updating an Ansible playbook that is executed via a CI/CD pipeline. The Ansible playbook was written to push the configuration change using the ios_config module. Which automated test validates that the interface is functioning as it should?

A.

Add a pipeline step that runs the playbook a second type. If it does not modify the device on the second run, then the interface is correctly configured.

B.

Automated testing is already built in because the playbook execution is successful only after Ansible validates that it applied the change.

C.

Add a pipeline step that captures and parses the packet flow for the interface.

D.

Add a pipeline step that captures and parses the show ip interface output so that the operational state can be referenced.

Full Access
Question # 17

A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?

A.

EXPOSE 8080

B.

FIREWALL ADD-PORT 8080

C.

PORT 8080

D.

OPEN PORT 8080

Full Access
Question # 18

What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?

A.

prepares a new host to accept a hard drive image built on another machine

B.

removes all host-specific information and components from the local machine

C.

installs all the latest security patches and OS updates to the local machine

D.

writes the local hard drive image to an ISO file that can be deployed to another machine

Full Access
Question # 19

What are two benefits of Infrastructure as Code? (Choose two.)

A.

It enables continuous integration.

B.

It allows for management control.

C.

It ensures consistency.

D.

It improves application monitoring.

E.

It reduces risk.

Full Access
Question # 20

Drag and drop the steps in Gartner's public cloud cost management framework from the left into the order on the right.

Full Access
Question # 21

As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?

A.

Leverage machine learning tools to more quickly identify problems m syslog and SNMP data

B.

Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols

C.

Identify and capture the key performance indicators that describe the state of the network

D.

Identify and fix network issues faster by leveraging streaming telemetry from network devices

Full Access
Question # 22

Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.

Full Access
Question # 23

An IT team at a SaaS company has this Cl/CD pipeline

  • Developers push code to the central repository by using Git.
  • The code is packaged and sent by an automated process to the staging environment where the tests are executed again automatically
  • If the automated tests pass in staging the code is pushed to production

Which change improves the Cl/CD pipeline?

A.

QA must also run the tests manually in the staging environment

B.

Operations must test in another environment before production

C.

Run unit tests before build and stage testing

D.

The developers run the unit tests manually instead of the QA team

Full Access
Question # 24

Which Kubernetes object ensures that each node is limited to running no more than one pod?

A.

UniCast

B.

Deployment

C.

DaemonSet

D.

ReplicaSet

Full Access
Question # 25

What is the impact of using the Drone.io CI/CD tool on the local installation step?

A.

slows down the development

B.

delays the deployment of components

C.

speeds up the procedure

D.

complicates the application process

Full Access
Question # 26

Refer to the exhibit.

A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?

A.

ReplicaSet

B.

PriorityClass

C.

Deployment

D.

Pod

Full Access
Question # 27

A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:

• Take a source Docker image named alpine

• Define two stages named build and push

• Check network connectivity before the stages run

• Fetch the latest Docker image

• Create a new Docker image and push it to the registry

• Tag the new Docker image as the latest version

Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.

Full Access
Question # 28

When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)

A.

mean time between success

B.

mean time to recover

C.

cone testing

D.

change lead time

E.

age of codebase

Full Access
Question # 29

Refer to the exhibit.

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

A.

Reverse lookup the IP address to add a hostname field

B.

Convert the date to the time zone of the system

C.

Configure the Linux machine to add a UID field to messages

D.

Filter out the text of the message to speed up searches

Full Access
Question # 30

Fill in the blanks to describe the concepts of extending DevOps practices to the network for NetDevOps.

NetDevOps builds and manages networks as a system that enables network services to be consumed in a DevOps approach. Organizations practicing NetDevOps see changes in the__________ as routine and expected activities, with a well-defined and practiced process for_____________, testing, and _____________ network changes. By making them routine, network changes can be small and simple.

Full Access
Question # 31

A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience.

Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)

A.

application feature sprawl

B.

CPU peak usage

C.

CPU average usage

D.

microservices count

E.

CPU frequency

Full Access
Question # 32

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)

A.

Service instances must be isolated from one another.

B.

Service must be independently deployable and scalable.

C.

Service are written using the same languages, frameworks, and framework versions.

D.

Service must be dependent, deployable, and scalable.

E.

Service instances do not need to be isolated from one another.

Full Access
Question # 33

Refer to the exhibit.

What is the user doing with Drone in this automated test?

A.

testing Alpine Linux versus Ubuntu Linux

B.

testing a PostgreSQL DB against multiple architectures

C.

testing only the amd64 architecture

D.

testing PostgreSQL deployment in an Alpine Linux VM

Full Access
Question # 34

Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or less.

Drag and drop the code snippets from the bottom onto the blanks in the code to monitor the site and network health on a Cisco DNA Center platform instance. Options may be used more than once. Not all options are used.

Full Access
Question # 35

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Full Access
Question # 36

A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)

A.

Apply

B.

Install

C.

Deploy

D.

Create

E.

Expose

Full Access
Question # 37

Which Kubernetes object is used to create a ClusterIP or NodePort?

A.

service

B.

pod

C.

deployment

D.

loadbalancer

Full Access
Question # 38

Drag and drop the code from the bottom onto the box where the code is missing to create a Terraform configuration that builds the network environment for a multitier software application. More EPG, Contract, and Filter definitions have been removed from the code.

Full Access
Question # 39

An engineer is developing a script that must call an API using a static Bearer token Which solution securely protects the credentials from being retrievable from the source code?

A)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access