Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CloudBees CJE - Certified Jenkins Engineer (CJE)

Page: 3 / 6
Total 186 questions

Which is an invalid matrix-based security realm?

A.

Administer

B.

Run

C.

Slave

D.

Drive

Which TIIKII of the following are considered best practices when setting up rules for notifications?

A.

Send notifications only when direct intervention is needed.

B.

Do not send developers too many email notifications.

C.

Make sure the notification's target Is the right person.

D.

Send notifications by multiple channels (email, chat room, PagerDuty, etc.) to make sure they are received.

E.

Periodically change the recipient of emails, to make sure they are not classified as spam.

How do you navigate to the matrix-based security section of Jenkins?

A.

Manage Jenkins -> Configure Global Security

B.

Manage Jenkins -> Configure System

C.

None of these

D.

Manage Jenkins -> Configure Global Options

Which is an invalid default project parameter?

A.

Boolean

B.

File

C.

String

D.

md5

You have a stage called "Promote to Green," and you only want to run it when "development" is the current branch in a multibranch pipeline. How would you use the "when" declarative to accomplish this?

A.

when { branch 'development' }

B.

when { branch 'master' }

C.

when( $branch == 'development')

D.

when 'development'

What's a big priority of continuous integration?

A.

Automate only when necessary

B.

Making sure a manager approves every line of code

C.

Fixing broken builds

Making sure everyone gets to contribute the exact same amount

DevOps teams can implement traceability of artifacts in a continuous delivery pipeline by using

A.

the Downstream Builds plugin

B.

manual recording

C.

the Pipeline plugin to fingerprint files

D.

Pipeline labels

Which answer best describes continuous deployment?

A.

Building in 60 minutes or less.

B.

A software development discipline where software is built so that it can be released to production at any time.

C.

A software development practice where contributors are integrating their work very frequently.

D.

A software development discipline where software is released continuously as part of an automated pipeline.

What do you need to configure an SSH agent?

A.

A username and password configured for the slave node

B.

SSH keys with the Master's pub key set as an authorized key on the agent node

C.

No special authorization setup

D.

None of these

Over the last six months, a large number of projects have been added to Jenkins. You have been asked by your manager to do some cleanup by creating some list views. How would you go about creating these list views?

A.

All of these

B.

Using a regular expression pattern

C.

Explicitly set projects to view

D.

Explicitly set recursively in sub-folders