A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
A. Ansible
B. pyATS
C. Genie CLI
D. Travis CI
What is the purpose of using a build tool in software development?
A. It complies source code into binaries and executables.
B. It provides a way to edit source code using a graphical interface.
C. It is a manual process that is followed to build software.
D. It tracks bugs and incidents in a built application.
What are two benefits of Infrastructure as Code? (Choose two.)
A. It enables continuous integration.
B. It allows for management control.
C. It ensures consistency.
D. It improves application monitoring.
E. It reduces risk.
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
A. node
B. app
C. agent
D. tier
E. event
What are two advantages of using Configuration Management Tools? (Choose two.)
A. reduction in policy violations caused by human errors
B. reduction in administration costs
C. reduction in network changes already performed automatically
D. reduction of on-premises networking equipment
E. reduction in networking team skills
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
A. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.
B. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.
C. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.
D. A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?
A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications
B. Use the same passwords across the entire CI/CD pipeline
C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
D. Never use one-time passwords in CI/CD pipeline
Refer to the exhibit.
A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?
A. Base Alter: TextMessage
B. Undefined: TextMessageBase
C. TextMessage -> Base
D. TextMessage -> Alter Base
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
1.
the CI/CD pipeline to spin up test instances.
2.
instances must be used to validate changes.
3.
changes must be validated prior to a continuous deployment workflow, and
4.
then push the changes to production
How should the pipeline target the required environment?
A. Use separate CI servers for each environment
B. Use different pipelines for each environment
C. Use separate Git repositories for each environment
D. Use different inventory files for each environment
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?
A. prepares a new host to accept a hard drive image built on another machine
B. removes all host-specific information and components from the local machine
C. installs all the latest security patches and OS updates to the local machine
D. writes the local hard drive image to an ISO file that can be deployed to another machine