Vcehome > Cisco > Cisco Certified DevNet Specialist > 300-910 > 300-910 Online Practice Questions and Answers

300-910 Online Practice Questions and Answers

Questions 4

Which description of a canary deployment is true?

A. deployment by accident

B. deployment that is rolled back automatically after a configurable amount of minutes

C. deployment relating to data mining development

D. deployment to a limited set of servers or users

Browse 114 Q&As
Questions 5

What are two reasons a Docker golden image should be updated? (Choose two.)

A. when there is a change to a username or password in the Docker secrets

B. when the application has a new release

C. when a fix for a security vulnerability is released

D. when a change is needed to an environment variable in the Dockerfile

E. when the base image is nearing the end of life

Browse 114 Q&As
Questions 6

What are two benefits of Infrastructure as Code? (Choose two.)

A. It enables continuous integration.

B. It allows for management control.

C. It ensures consistency.

D. It improves application monitoring.

E. It reduces risk.

Browse 114 Q&As
Questions 7

What are two advantages of using Configuration Management Tools? (Choose two.)

A. reduction in policy violations caused by human errors

B. reduction in administration costs

C. reduction in network changes already performed automatically

D. reduction of on-premises networking equipment

E. reduction in networking team skills

Browse 114 Q&As
Questions 8

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A. Dynamic Application Security Testing

B. Runtime Application Health-Protection

C. Continuous Application Security Testing

D. Static Analysis Security Testing

Browse 114 Q&As
Questions 9

Refer to the exhibit.

A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?

A. The CI/CD system is configured incorrectly to import the dependencies to the code

B. The code is pushed incorrectly to the CI/CD system

C. The version of Python is wrong in the CI/CD pipeline

D. The CI/CD system is configured incorrectly to download the required dependencies

Browse 114 Q&As
Questions 10

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.

Which approach accomplishes this goal?

A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications

B. Use the same passwords across the entire CI/CD pipeline

C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline

D. Never use one-time passwords in CI/CD pipeline

Browse 114 Q&As
Questions 11

An IT department needs to deploy a new application named `Entfin434772390' across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named `Entfin02754932l'. Both versions of the application are running in the production environment.

Which release strategy should be used by the IT department?

A. agile

B. canary

C. rollbacks

D. blue/green

Browse 114 Q&As
Questions 12

What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?

A. prepares a new host to accept a hard drive image built on another machine

B. removes all host-specific information and components from the local machine

C. installs all the latest security patches and OS updates to the local machine

D. writes the local hard drive image to an ISO file that can be deployed to another machine

Browse 114 Q&As
Questions 13

Refer to the exhibit.

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

A. Reverse lookup the IP address to add a hostname field

B. Convert the date to the time zone of the system

C. Configure the Linux machine to add a UID field to messages

D. Filter out the text of the message to speed up searches

Browse 114 Q&As
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: May 13, 2024
Questions: 114 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99