Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-910 Sample Questions Answers

Questions 4

Which two statements about Infrastructure as Code are true? (Choose two.)

Options:

A.

Test-driven development practices make use of Infrastructure as Code.

B.

Infrastructure as Code refers to automated testing libraries.

C.

DevOps builds upon Infrastructure as Code.

D.

Infrastructure as Code is based on practices from software development.

E.

Infrastructure as Code must use the same programming language as the application.

Buy Now
Questions 5

Refer to the exhibit.

Which action allows the development team to reach the deployed application?

Options:

A.

Create an init container to initialize routes for the containers in the pod

B.

Create a service to expose the logic running in the pod

C.

Delete the deployment and redeploy by using a ReplicaSet.

D.

Delete the deployment and redeploy by using the latest tag for the container image

Buy Now
Questions 6

Which two actions help limit the attack surface of your Docker container? (Choose two.)

Options:

A.

Run only a single service in each container.

B.

Run all services in a single image.

C.

Use version tags for base images and dependencies.

D.

Use Kali Linux as a base image.

E.

Download images over HTTPS supporting sites.

Buy Now
Questions 7

An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?

Options:

A.

secrets

B.

sane defaults

C.

application parameters

D.

config maps

Buy Now
Questions 8

What are two testing scenarios of the chaos engineering principle? (Choose two.)

Options:

A.

maxing out CPU cores on an Elasticsearch cluster

B.

removing all users from a version control system

C.

executing routine in driver code to emulate I/O errors

D.

blocking developers’ building access

E.

unplugging a core switch device

Buy Now
Questions 9

What is the effective way to manage computing costs in a public cloud?

Options:

A.

Monitor data transfers to minimize cost.

B.

Use dedicated hardware for all instances.

C.

Select the largest instance option available in order to pay for only one instance.

D.

Make use of elastic services and scale on demand.

Buy Now
Questions 10

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.

Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

Options:

A.

Grafana has lost connectivity to Prometheus, which causes graphs to display only the cached data.

B.

CPU and memory metrics from Kubernetes nodes are not accurate due to the way that containers share resources.

C.

Some containers are crashing regularly and being restarted automatically by Kubernetes.

D.

The metricbeat agent has crashed and is no longer sending new data to Prometheus, so the metrics are not updating.

Buy Now
Questions 11

Drag and drop the scenarios from the left onto the cloud strategy categories on the right.

Options:

Buy Now
Questions 12

Which Dockerfile yields the most predictable builds?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 13

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.

Options:

Buy Now
Questions 14

A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience.

Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)

Options:

A.

application feature sprawl

B.

CPU peak usage

C.

CPU average usage

D.

microservices count

E.

CPU frequency

Buy Now
Questions 15

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

Options:

A.

Remove the failing test.

B.

Manually deploy the change into the production environment

C.

Use a backup pipeline

D.

Replicate the production environment in the pipeline before applying

Buy Now
Questions 16

A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?

Options:

A.

recreate

B.

blue/green

C.

rolling

D.

canary

Buy Now
Questions 17

Refer to the exhibit.

A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?

Options:

A.

ReplicaSet

B.

PriorityClass

C.

Deployment

D.

Pod

Buy Now
Questions 18

What is the purpose of using a build tool in software development?

Options:

A.

It complies source code into binaries and executables.

B.

It provides a way to edit source code using a graphical interface.

C.

It is a manual process that is followed to build software.

D.

It tracks bugs and incidents in a built application.

Buy Now
Questions 19

Refer to the exhibit.

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

Options:

A.

Base Alter: TextMessage

B.

Undefined: TextMessageBase

C.

TextMessage -> Base

D.

TextMessage -> Alter Base

Buy Now
Questions 20

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

Options:

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Buy Now
Questions 21

A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.

Which command does the pipeline run to accomplish this goal?

Options:

A.

terraform plan

B.

terraform check

C.

terraform fmt

D.

terraform validate

Buy Now
Questions 22

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

Options:

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Buy Now
Questions 23

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

Options:

A.

The default path is not used.

B.

The volume is not created.

C.

The volume is created.

D.

The volume is created with errors.

Buy Now
Questions 24

An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.

Which command validates the success of the application deployment?

Options:

A.

kubectl get pods -o wide -w

B.

kubectl rollout status deployment

C.

kubectl describe pods/

D.

kubectl rollout history deployment

Buy Now
Questions 25

What is chaos engineering?

Options:

A.

designing an application with fuzzy logic that makes it hard to predict

B.

a product engineering approach that lacks a formal methodology

C.

splitting a project between teams that do not communicate with each other

D.

introducing problems into a system to study behavior and improve reliability

Buy Now
Questions 26

Refer to the exhibit.

How should the Jenkins job be troubleshooted based on the error provided?

Options:

A.

Verify what the responding file created.

B.

Update pip.

C.

Install dependencies.

D.

Place the code in a container and run the job again.

Buy Now
Questions 27

Which description of a canary deployment is true?

Options:

A.

deployment by accident

B.

deployment that is rolled back automatically after a configurable amount of minutes

C.

deployment relating to data mining development

D.

deployment to a limited set of servers or users

Buy Now
Questions 28

Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used

Options:

Buy Now
Questions 29

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

Options:

Buy Now
Questions 30

A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?

Options:

A.

Ansible

B.

pyATS

C.

Genie CLI

D.

Travis CI

Buy Now
Questions 31

What are two advantages of using Configuration Management Tools? (Choose two.)

Options:

A.

reduction in policy violations caused by human errors

B.

reduction in administration costs

C.

reduction in network changes already performed automatically

D.

reduction of on-premises networking equipment

E.

reduction in networking team skills

Buy Now
Questions 32

What is a principle of chaos engineering?

Options:

A.

common user access on system monitoring infrastructure

B.

proactive testing based on system responsiveness

C.

prevent mistakes that cause infrastructure service disruption

D.

reactive system monitoring for network infrastructure outages

Buy Now
Questions 33

An IT department needs to deploy a new application named ‘Entfin434772390’ across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named ‘Entfin02754932l’. Both versions of the application are running in the production environment.

Which release strategy should be used by the IT department?

Options:

A.

agile

B.

canary

C.

rollbacks

D.

blue/green

Buy Now
Questions 34

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

Options:

A.

Add a unit test to block the secrets

B.

Add a precommit Git hook to block the secrets

C.

Add dast to the repository to block the secrets

D.

Add a job in the CI build to block the secrets

Buy Now
Questions 35

What is a benefit of monitoring the CI/CD pipeline?

Options:

A.

troubleshoots distributed systems performance

B.

proactively deploys new servers if needed

C.

analyzes network outages that affect the network and server infrastructure

D.

provides insight into how efficiently the development team is operating

Buy Now
Questions 36

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.

In which file should the name of the middleware server be configured?

Options:

A.

Docker Service discovery daemon

B.

Docker Swarm

C.

Docker Compose

D.

Dynamic Host Configuration Protocol

Buy Now
Questions 37

Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.

Options:

Buy Now
Questions 38

A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.

Which deployment strategy must be used?

Options:

A.

rolling

B.

blue/green

C.

shadow

D.

canary

Buy Now
Questions 39

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

Options:

A.

Jenkins

B.

Genie CLI

C.

Travis CI

D.

Python YAML data libraries

Buy Now
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Nov 30, 2024
Questions: 114
$70  $174.99
$54  $134.99
$46  $114.99
buy now 300-910