Join the discussion
Add Comments
- Other Question (107q)
- Q1. Which Kubernetes object is used to create a ClusterIP or NodePort?...
- Q2. Fill in the blanks to complete the line of Python code that sends a message to a Webex Tea...
- Q3. Refer to the exhibit. (Exhibit) The exhibit shows the output of an Ansible task that print...
- Q4. What is an advantage of using configuration management tools to automate infrastructure se...
- Q5. A DevOps engineer has built a container to host a web-server and it must run as an executa...
- Q6. An engineer is developing a script that must call an API using a static Bearer token Which...
- Q7. Refer to the exhibit. (Exhibit) What is causing the requests code to fail?...
- Q8. What is a capability of node-level logging in Kubernetes?...
- Q9. Which two actions help limit the attack surface of your Docker container? (Choose two.)...
- Q10. Refer to the exhibit. (Exhibit) An application has been developed as a fileserver. To crea...
- Q11. - A developer is creating an application where each service uses a different operating sys...
- Q12. What is chaos engineering?
- Q13. How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesti...
- Q14. ConfigMap keys have been mapped to different file names using the volumes.configMap.items ...
- Q15. Refer to the exhibit. (Exhibit) The text represents a syslog message sent from a Linux ser...
- Q16. Which two characteristics of a build tool that is used in an automated build pipeline? (Ch...
- Q17. Which step must be taken to enable centralized logging in a Kubernetes environment?...
- Q18. A new version of an application is being released by creating a separate instance of the a...
- Q19. Which two practices help make the security of an application a more integral part of the s...
- Q20. Refer to the exhibit. (Exhibit) What are the properties of the load balancer in a Kubernet...
- Q21. ConfigMap keys have been mapped to different file names using the volumes.configMap.items ...
- Q22. The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed t...
- Q23. What are two advantages of using Configuration Management Tools? (Choose two.)...
- Q24. Construct an Ansible script to gather information about target routers and then use it to ...
- Q25. Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit ...
- Q26. A developer must create a GitLab CI/CD pipeline with these requirements: * builds an on-de...
- Q27. Which interface is most commonly used to integrate logging, monitoring, and alerting appli...
- Q28. Refer to the exhibit. (Exhibit) An application for data storing and processing has been cr...
- Q29. A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A...
- Q30. Configuration changes to the production network devices are performed by a CI/CD pipeline....
- Q31. Which step must be taken to enable centralized logging in a Kubernetes environment?...
- Q32. A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A...
- Q33. What is the purpose of using sysprep when developing a Microsoft Windows-based golden imag...
- Q34. Fill in the blank to complete the statement. A user wants a Kubernetes deployment to run t...
- Q35. Refer to the exhibit. (Exhibit) An application for data storing and processing has been cr...
- Q36. Refer to the exhibit. (Exhibit) A development team is designing an application that will i...
- Q37. Configuration changes to the production network devices are performed by a CI/CD pipeline....
- Q38. A precheck validation is being designed for the network state in a Cl/CD pipeline This des...
- Q39. Refer to the Exhibit. (Exhibit) Refer to the exhibit. A containerized application that lev...
- Q40. The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed t...
- Q41. FILL BLANK Fill in the blank to complete the statement. A user wants a Kubernetes deployme...
- Q42. A DevOps engineer has built a new container and must open port 8080 for intercontainer com...
- Q43. Refer to the exhibit. (Exhibit) What is the user doing with Drone in this automated test?...
- Q44. What is as responsibility for teams running private cloud servers that is less of a concer...
- Q45. A developer is nearing the end of a software development cycle and is ready to deploy the ...
- Q46. A developer is nearing the end of a software development cycle and is ready to deploy the ...
- Q47. Refer to the exhibit. (Exhibit) The push_configs.yml playbook returns the error shown. Whi...
- Q48. Drag and drop the operations from the left into the correct order on the right when using ...
- Q49. Fill in the blanks to complete the statement. When creating multiple containers, in order ...
- Q50. What is the purpose of using a build tool in software development?...
- Q51. When DevOps practices are integrated into an existing organization, which two characterist...
- Q52. A new version of an application is being released by creating a separate instance of the a...
- Q53. DRAG DROP Drag and drop the commands from the bottom onto the correct Terraform code in th...
- Q54. Refer to the exhibit. (Exhibit) What is the reason for this error message?...
- Q55. A DevOps engineer is supporting a containerized application with multiple components runni...
- Q56. An application is being built to collect and display telemetry streaming dat a. Drag and d...
- Q57. Which type of testing should be integrated into a CI/CD pipeline to ensure the correct beh...
- Q58. Drag and drop the operations from the left into the correct order on the right when using ...
- Q59. Refer to the exhibit. (Exhibit) A distributed application contains data services that conn...
- Q60. Refer to the exhibit. (Exhibit) What is the reason for this error message?...
- Q61. Which method is a safe way to provide a username/password combination to an application ru...
- Q62. Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit ...
- Q63. A DevOps engineer must build a Docker image to containerize an application. Then the image...
- Q64. Refer to the exhibit. (Exhibit) Which CI solution uses this file?...
- Q65. AppDynamics is being used to monitor your distributed Python application. Each individual ...
- Q66. A security team is running vulnerability scans against a CI/CD pipeline. The reports show ...
- Q67. DRAG DROP The IaC configuration for an application is being deployed using a CI/CD pipelin...
- Q68. Construct an Ansible script to gather information about target routers and then use it to ...
- Q69. Which type of security testing should be performed as a part of a CI/CD pipeline by analyz...
- Q70. An application is being built to collect and display telemetry streaming data. Drag and dr...
- Q71. A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A...
- Q72. A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipel...
- Q73. Microservices architecture pattern has been applied and the system has been architected as...
- Q74. Refer to the exhibit. (Exhibit) The exhibit shows the output of an Ansible task that print...
- Q75. A development team is using Cl/CD during application development During the latest release...
- Q76. What is a principle of chaos engineering?
- Q77. Construct an Ansible script to gather information about target routers and then use it to ...
- Q78. Fill in the blanks to describe the concepts of extending DevOps practices to the network f...
- Q79. What is as responsibility for teams running private cloud servers that is less of a concer...
- Q80. Refer to the Exhibit. Drag and drop the code snippets from the bottom onto the boxes in th...
- Q81. Which Dockerfile yields the most predictable builds?...
- Q82. What is the purpose of using a build tool in software development?...
- Q83. Which interface is most commonly used to integrate logging, monitoring, and alerting appli...
- Q84. An application communicates with multiple third-party services that use API keys When stre...
- Q85. DRAG DROP An application is being built to collect and display telemetry streaming data. D...
- Q86. Fill in the blanks to complete the line of Python code that sends a message to a Webex Tea...
- Q87. How does eliminating hardcoded or default passwords help to secure an environment?...
- Q88. Refer to the exhibit. (Exhibit) A development team is designing an application that will i...
- Q89. A developer has created a deployment that should launch a pod to run their database servic...
- Q90. Which Docker command is used to start an interactive Bash shell in a running container nam...
- Q91. Which type of security testing should be performed as a part of a CI/CD pipeline by analyz...
- Q92. Which two elements help to secure your API keys? (Choose two.)...
- Q93. A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplis...
- Q94. An application has been designed based on microservices. The application is deployed on Ku...
- Q95. Which type of security testing should be performed as a part of a CI/CD pipeline by analyz...
- Q96. Refer to the exhibit. (Exhibit) What is the reason for this error message?...
- Q97. (Exhibit) Refer to the exhibit. What is the reason for this error message?...
- Q98. Refer to the exhibit. (Exhibit) A developer is creating a script to test APIs. The Cisco W...
- Q99. The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed t...
- Q100. A team is developing an application for end users. The application will use microservices....
- Q101. Which interface is most commonly used to integrate logging, monitoring, and alerting appli...
- Q102. How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesti...
- Q103. A DevOps engineer has built a new container and must open port 8080 for intercontainer com...
- Q104. A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplis...
- Q105. Refer to the exhibit. (Exhibit) How does the architecture respond to a usage spike?...
- Q106. To make logging searches more efficient and useful in Kibana, an Administrator wants to im...
- Q107. Refer to the exhibit. (Exhibit) The exhibit shows the output of an Ansible task that print...
