Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-910 - Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)

Page: 4 / 4
Total 114 questions

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)

A.

Service instances must be isolated from one another.

B.

Service must be independently deployable and scalable.

C.

Service are written using the same languages, frameworks, and framework versions.

D.

Service must be dependent, deployable, and scalable.

E.

Service instances do not need to be isolated from one another.

Refer to the exhibit.

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

A.

Reject string values that are greater than maximum size

B.

Use floating point instead of integer for rating to avoid overflow

C.

Validate the content of the name and address parameters

D.

Run the application in a Docker container

E.

Compile the application using Java HotSpot

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.

A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?

A.

ENTRYPOINT

B.

ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]

C.

ENTRYPOINT [“BACKGROUND”, “-D”, “/usr/sbin/apache2ctl”]

D.

ENTRYPOINT {usr/sbin/apache2ctl}

Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?

A.

AMQP

B.

SNMP

C.

SSH

D.

REST

-

A developer is creating an application where each service uses a different operating system. The application components need to be isolated but must have the ability to communicate with each other.

Drag and drop the entries from the left into the order on the right to create a Dockerfile that will accomplish this goal.

Refer to the exhibit. A containerized application that leverages a container host VM must be deployed. Drag and drop the events on the left onto their related steps on the right in order to describe the sequence behind the process.

How does eliminating hardcoded or default passwords help to secure an environment?

A.

helps by enforcing your password in a repository and storing it in a secure vault

B.

helps to manage passwords centrally

C.

helps penetration testing team to focus on other issues more efficiently

D.

helps by removing back doors in your environments