Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Exam Practice Test

Demo: 39 questions
Total 114 questions

Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Questions and Answers

Question 1

A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.

Which command does the pipeline run to accomplish this goal?

Options:

A.

terraform plan

B.

terraform check

C.

terraform fmt

D.

terraform validate

Question 2

Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 3

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Options:

Question 4

Refer to the exhibit.

The push_configs.yml playbook returns the error shown.

Which action resolves the error?

Options:

A.

Install the Paramiko library on the host that runs Ansible

B.

Generate a new SSH key pair and add the public key to the target machine

C.

Export the ANSIBLE_HOST_KEY_CHECKING=False variable

D.

Comment out the StrictHostKeyChecking=yes line from ansible.cfg

Question 5

What is a practice of infrastructure as code?

Options:

A.

Use multiple version control systems

B.

Document as much as possible

C.

Configure the deployment consistently

D.

Test, integrate, and deploy once a day

Question 6

A developer must create a GitLab CI/CD pipeline with these requirements:

• builds an on-demand test environment

• deploys configurations

• verifies the results

Drag and drop the code from the bottom onto the box where the code is missing to complete the GitLab CI/CD pipeline. Not all options are used.

Options:

Question 7

Which Kubernetes object ensures that each node is limited to running no more than one pod?

Options:

A.

UniCast

B.

Deployment

C.

DaemonSet

D.

ReplicaSet

Question 8

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

Options:

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Question 9

Refer to the exhibit.

How does the architecture respond to a usage spike?

Options:

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

C.

The Orchestrator increases the resources assigned to containers to increase performance

D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

Question 10

A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?

Options:

A.

Ansible

B.

pyATS

C.

Genie CLI

D.

Travis CI

Question 11

An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?

Options:

A.

secrets

B.

sane defaults

C.

application parameters

D.

config maps

Question 12

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

Options:

A.

Use self-developed algorithms for encryption

B.

Install virtual firewalls

C.

Actively change the ISP provider

D.

Apply all the latest patches and updates

Question 13

Refer to the exhibit.

Which CI solution uses this file?

Options:

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jentans

Question 14

A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?

Options:

A.

ENTRYPOINT

B.

ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]

C.

ENTRYPOINT [“BACKGROUND”, “-D”, “/usr/sbin/apache2ctl”]

D.

ENTRYPOINT {usr/sbin/apache2ctl}

Question 15

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

Options:

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Question 16

An engineer is developing a script that must call an API using a static Bearer token Which solution securely protects the credentials from being retrievable from the source code?

A)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 17

What is a benefit of monitoring the CI/CD pipeline?

Options:

A.

troubleshoots distributed systems performance

B.

proactively deploys new servers if needed

C.

analyzes network outages that affect the network and server infrastructure

D.

provides insight into how efficiently the development team is operating

Question 18

Refer to the exhibit.

A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?

Options:

A.

The CI/CD system is configured incorrectly to import the dependencies to the code

B.

The code is pushed incorrectly to the CI/CD system

C.

The version of Python is wrong in the CI/CD pipeline

D.

The CI/CD system is configured incorrectly to download the required dependencies

Question 19

An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.

Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)

Options:

A.

Changes must be scheduled to deploy at a specific time that has minimal traffic

B.

Changes must include automated tests

C.

Changes must be validated during deployment to the production environment

D.

Smaller, individually testable changes must be merged first

E.

Team members must be responsible for the code committed by any team member

Question 20

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Options:

Question 21

Refer to the exhibit.

What is causing the requests code to fail?

Options:

A.

Rython3 is not compatible with requests.

B.

The requests library is not imported.

C.

The requests library is not installed.

D.

The requests coming into stdin fail because device_ip cannot be parsed.

Question 22

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.

Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

Options:

A.

Grafana has lost connectivity to Prometheus, which causes graphs to display only the cached data.

B.

CPU and memory metrics from Kubernetes nodes are not accurate due to the way that containers share resources.

C.

Some containers are crashing regularly and being restarted automatically by Kubernetes.

D.

The metricbeat agent has crashed and is no longer sending new data to Prometheus, so the metrics are not updating.

Question 23

Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.

Options:

Question 24

When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?

Options:

A.

Add a step to run the debug ip routing command before the change, and add a step after the change to

issue the no debug ip routing command.

B.

Add a step to capture the routing table before the change, and add a step after the change to capture it again. Calculate the difference between the two for review.

C.

Add a step to ping a host on each of the static routes before the change, and a step after to repeat the same check. Calculate the difference between the two checks for review.

D.

Add a step to run the same playbook again with the debug option enabled and use grep on the log output to ensure that the commands are not applied again.

Question 25

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

Options:

A.

Remove the failing test.

B.

Manually deploy the change into the production environment

C.

Use a backup pipeline

D.

Replicate the production environment in the pipeline before applying

Question 26

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:

• the CI/CD pipeline to spin up test instances.

• instances must be used to validate changes.

• changes must be validated prior to a continuous deployment workflow, and

• then push the changes to production

How should the pipeline target the required environment?

Options:

A.

Use separate CI servers for each environment

B.

Use different pipelines for each environment

C.

Use separate Git repositories for each environment

D.

Use different inventory files for each environment

Question 27

Which two elements help to secure your API keys? (Choose two.)

Options:

A.

ramdomness

B.

SHA1

C.

triple AES

D.

rotation

E.

dictionary

Question 28

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.

Options:

Question 29

Refer to the exhibit.

How should the Jenkins job be troubleshooted based on the error provided?

Options:

A.

Verify what the responding file created.

B.

Update pip.

C.

Install dependencies.

D.

Place the code in a container and run the job again.

Question 30

Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.

Options:

Question 31

What are two advantages of using Configuration Management Tools? (Choose two.)

Options:

A.

reduction in policy violations caused by human errors

B.

reduction in administration costs

C.

reduction in network changes already performed automatically

D.

reduction of on-premises networking equipment

E.

reduction in networking team skills

Question 32

Refer to the exhibit.

The snippet contains the JSON string that will be sent to the Prometheus AlertManager to silence an alert. AlertManager accepts only the content type of application 'json'' Which Python code correctly sends an API call to perform action?

Options:

A.

respone= request.post(url. json=json_data)

B.

respone= request.post(url. json=json.loads(json_data)

C.

respone= request.post(url. data=json_data)

D.

respone= request.post(url, data=json=(json_data)

Question 33

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.

Which Kubernetes command confirms that the service is running and usable?

Options:

A.

kubectl -n Cisco get services | grep “Cisco-DB”

B.

kubectl -n Cisco get pods | grep “Cisco-DB”

C.

kubectl get pods | grep “Cisco-DB”

D.

kubectl -n Cisco get service | grep “Cisco-DB”

Question 34

Refer to the exhibit. A containerized application that leverages a container host VM must be deployed. Drag and drop the events on the left onto their related steps on the right in order to describe the sequence behind the process.

Options:

Question 35

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

Options:

A.

Add a unit test to block the secrets

B.

Add a precommit Git hook to block the secrets

C.

Add dast to the repository to block the secrets

D.

Add a job in the CI build to block the secrets

Question 36

A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.

Which deployment strategy must be used?

Options:

A.

rolling

B.

blue/green

C.

shadow

D.

canary

Question 37

An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?

Options:

A.

Check to make sure Nginx is running.

B.

Check for response times in Nginx logs.

C.

Check to make sure the web API response is coming back in JSON.

D.

Check the size of the database that the application is using.

Question 38

Refer to the exhibit A DevOps engineer must deploy two microservices The deployment must be installed in a new Kubernetes cluster. The microservices currently run in Docker and are managed by using the provided docker-compose yml file Drag and drop the steps from the left into order on the right to successfully deploy the microservices

Options:

Question 39

Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.

Options:

Demo: 39 questions
Total 114 questions