Refer to the exhibit.
Which action allows the development team to reach the deployed application?
Which two actions help limit the attack surface of your Docker container? (Choose two.)
An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?
What are two testing scenarios of the chaos engineering principle? (Choose two.)
A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.
Which type of failure would prevent the engineer from seeing the problem using the captured metrics?
Drag and drop the scenarios from the left onto the cloud strategy categories on the right.
An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.
A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience.
Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?
Refer to the exhibit.
A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?
Refer to the exhibit.
A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.
Which command does the pipeline run to accomplish this goal?
A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.
Which metric must be used to trigger autoscaling events?
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.
Which command validates the success of the application deployment?
Refer to the exhibit.
How should the Jenkins job be troubleshooted based on the error provided?
Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used
Refer to the exhibit.
A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.
Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
An IT department needs to deploy a new application named ‘Entfin434772390’ across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named ‘Entfin02754932l’. Both versions of the application are running in the production environment.
Which release strategy should be used by the IT department?
An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.
Which action must be used to prevent developers from accidentally committing secrets in the code?
A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.
In which file should the name of the middleware server be configured?
Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.
A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.
Which deployment strategy must be used?
A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?