Cisco (300-910-DEVOPS) Exam Questions And Answers page 1
What are the two elements that help secure API keys?
Multiple Choice
Which two elements help to secure your API keys? (Choose two.)
SHA1
triple AES
rotation
dictionary
DevOps Security
Monitoring and Analytics
A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?
recreate
blue/green
rolling
canary
DevOps Principles and Practices
DevOps Toolchain
Which step must be taken to enable centralized logging in a Kubernetes environment?
No steps need to be taken. The master node automatically aggregates logs from all worker nodes and stores them on the specified persistent volume.
Create a CustomResourceDefinition in each deployment that specifies the IP or names the log collector.
Deploy a sidecar node that aggregates logs from the entire cluster.
Create a DaemonSet that deploys a container with a logging agent on every node in the cluster.
Automation and Orchestration
DevOps Toolchain
Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)
Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.
Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.
Use only software modules that are written by the internal team.
Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.
Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.
Automation and Orchestration
DevOps Toolchain
How can you limit the attack surface of your Docker container?
Multiple Choice
Which two actions help limit the attack surface of your Docker container? (Choose two.)
Run only a single service in each container.
Run all services in a single image.
Use version tags for base images and dependencies.
Use Kali Linux as a base image.
Download images over HTTPS supporting sites.
DevOps Security
Automation and Orchestration
Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)
Service instances must be isolated from one another.
Service must be independently deployable and scalable.
Service are written using the same languages, frameworks, and framework versions.
Service must be dependent, deployable, and scalable.
Service instances do not need to be isolated from one another.
Automation and Orchestration
Automation and Orchestration
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
Ansible
pyATS
Genie CLI
Travis CI
DevOps Principles and Practices
Continuous Integration and Deployment
FILL BLANK
Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.
Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.
Automation and Orchestration
Cisco DevOps Tools and Platforms
To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?
Configure a new JSON object in Kibana.
Create a search index in Logstash.
Create an index pattern in Kibana.
Create a time filter on Kibana to look at time only.
Automation and Orchestration
Automation and Orchestration
A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster.
What kind of high-availability configuration is the developer running?
What kind of high-availability configuration is the developer running?
active
passive
active-passive
active-active
Automation and Orchestration
DevOps Toolchain
Comments