300-910
Free trial
Verified
Question 1
DRAG DROP -
The IaC configuration for an application is being deployed using a CI/CD pipeline. Drag and drop the steps for this pipeline from the left into the correct order that they would be executed on the right. Not all options are used.
Select and Place:
Question 2
Refer to the exhibit. What is causing the requests code to fail?
- A: Rython3 is not compatible with requests.
- B: The requests library is not imported.
- C: The requests library is not installed.
- D: The requests coming into stdin fail because device_ip cannot be parsed.
Question 3
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.
Which command validates the success of the application deployment?
- A: kubectl get pods -o wide -w
- B: kubectl rollout status deployment
- C: kubectl describe pods/
- D: kubectl rollout history deployment
Question 4
A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.
Which metric must be used to trigger autoscaling events?
- A: network
- B: CPU/GPU
- C: disk I/O
- D: memory
Question 5
DRAG DROP
Drag and drop the scenarios from the left onto the cloud strategy categories on the right.
Question 6
What is a capability of node-level logging in Kubernetes?
- A: Using the Kubernetes JSON logging driver enables log persistence
- B: Output that is written to stdin is retrieved by using kubectl
- C: Output that is written to stderr is not logged or retrievable by using kubectl
- D: Using the local logging driver of Docker enables log persistence
Question 7
Which Dockerfile yields the most predictable builds?
- A:
- B:
- C:
- D:
Question 8
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?
- A: prepares a new host to accept a hard drive image built on another machine
- B: removes all host-specific information and components from the local machine
- C: installs all the latest security patches and OS updates to the local machine
- D: writes the local hard drive image to an ISO file that can be deployed to another machine
Question 9
An IT department needs to deploy a new application named ‘Entfin434772390’ across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named ‘Entfin02754932l’. Both versions of the application are running in the production environment.
Which release strategy should be used by the IT department?
- A: agile
- B: canary
- C: rollbacks
- D: blue/green
Question 10
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.
Question 11
DRAG DROP
Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.
Question 12
Refer to the exhibit. Which CI solution uses this file?
- A: Drone
- B: GitLab CI
- C: Travis CI
- D: Jenkins
Question 13
DRAG DROP -
Drag and drop the operations from the left into the correct order on the right when using CI/CD, assuming that there are no failures or conflicts.
Select and Place:
Question 14
Refer to the exhibit. An application for data storing and processing has been created. The application is time-sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application.
Which action will help resolve the errors?
- A: Rewrite the SQL query identified in the transaction to be more efficient
- B: Log in to the node directly and investigate the errors by reviewing log files
- C: Drill down to investigate and identify the errors
- D: Scale out the node horizontally
Question 15
Refer to the exhibit. A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?
- A: The CI/CD system is configured incorrectly to import the dependencies to the code
- B: The code is pushed incorrectly to the CI/CD system
- C: The version of Python is wrong in the CI/CD pipeline
- D: The CI/CD system is configured incorrectly to download the required dependencies
Question 16
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?
- A:
- B:
- C:
- D:
Question 17
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?
- A: Give the accounts used in the CI/CD pipeline full administrative rights to all applications
- B: Use the same passwords across the entire CI/CD pipeline
- C: Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
- D: Never use one-time passwords in CI/CD pipeline
Question 18
An IT team plans to deploy a new service built on top of an existing service. The capacity needed for the new service is difficult to estimate because the demand for the new service is undetermined. The team has these deployment requirements:
• A subset of the users of the original service must be migrated to the new service based on their profile
• The new service must be rolled back easily if capacity exceeds estimates
Which deployment strategy must be used?
- A: rolling
- B: blue/green
- C: geolocation
- D: canary
Question 19
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
- A: Ansible
- B: pyATS
- C: Genie CLI
- D: Travis CI
Question 20
A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?
- A: EXPOSE 8080
- B: FIREWALL ADD-PORT 8080
- C: PORT 8080
- D: OPEN PORT 8080
Question 21
Which two actions help limit the attack surface of your Docker container? (Choose two.)
- A: Run only a single service in each container.
- B: Run all services in a single image.
- C: Use version tags for base images and dependencies.
- D: Use Kali Linux as a base image.
- E: Download images over HTTPS supporting sites.
Question 22
A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?
- A: ENTRYPOINT <usr/sbin/apache2ctl>
- B: ENTRYPOINT ["/usr/sbin/apache2ctl", "-D", "FOREGROUND"]
- C: ENTRYPOINT ["BACKGROUND", "-D", "/usr/sbin/apache2ctl"]
- D: ENTRYPOINT {usr/sbin/apache2ctl}
Question 23
Which Docker command is used to start an interactive Bash shell in a running container named "test"?
- A: docker attach -it test /bin/bash
- B: docker run -it test /bin/bash
- C: docker exec -it test /bin/bash
- D: docker run test /bin/bash
That’s the end of your free questions
You’ve reached the preview limit for 300-910Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!