Leads4pass > Cisco > Cisco Certified DevNet Professional > 300-910 > 300-910 Online Practice Questions and Answers

300-910 Online Practice Questions and Answers

Questions 4

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.

Why did the pipeline fail to start?

A. The CI server was not configured as a Git remote for the repository.

B. The webhook call from the code repository did not reach the CI server.

C. Configuration changes must be sent to the pipeline, which then updates the repository.

D. The pipeline must be started manually after the code repository is updated.

Buy Now
Questions 5

A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?

A. Ansible

B. pyATS

C. Genie CLI

D. Travis CI

Buy Now
Questions 6

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability.

In which two ways are these services packaged and deployed? (Choose two.)

A. Service instances must be isolated from one another.

B. Service must be independently deployable and scalable.

C. Service are written using the same languages, frameworks, and framework versions.

D. Service must be dependent, deployable, and scalable.

E. Service instances do not need to be isolated from one another.

Buy Now
Questions 7

Refer to the exhibit.

What is the reason for this error message?

A. The required dependencies for the urllib3 module are not installed.

B. The requests module is not installed.

C. The required dependencies for the requests module are not installed.

D. The site-packages directory has been corrupted.

Buy Now
Questions 8

When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)

A. mean time between success

B. mean time to recover

C. cone testing

D. change lead time

E. age of codebase

Buy Now
Questions 9

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.

If an attacker gains access to the scripts, what is the risk exposure?

A. The Automation server is at risk of being compromised.

B. The Ansible scripts run through encrypted SSH connections.

C. The internal network is at risk of being compromised.

D. The entire CI/CD-related infrastructure is at risk.

Buy Now
Questions 10

Refer to the exhibit.

What are the properties of the load balancer in a Kubernetes environment?

A. Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

B. Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

C. Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

D. Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp

Buy Now
Questions 11

What is a capability of node-level logging in Kubernetes?

A. Using the Kubernetes JSON logging driver enables log persistence

B. Output that is written to stdin is retrieved by using kubectl

C. Output that is written to stderr is not logged or retrievable by using kubectl

D. Using the local logging driver of Docker enables log persistence

Buy Now
Questions 12

An application for storing and categorizing has been developed. The application uses dual- factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

A. Use self-developed algorithms for encryption

B. Install virtual firewalls

C. Actively change the ISP provider

D. Apply all the latest patches and updates

Buy Now
Questions 13

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

A. Add a unit test to block the secrets

B. Add a precommit Git hook to block the secrets

C. Add dast to the repository to block the secrets

D. Add a job in the CI build to block the secrets

Buy Now
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Oct 16, 2024
Questions: 114
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99