Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Questions and Answers

Questions 4

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Options:

Buy Now
Questions 5

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.

In which file should the name of the middleware server be configured?

Options:

A.

Docker Service discovery daemon

B.

Docker Swarm

C.

Docker Compose

D.

Dynamic Host Configuration Protocol

Buy Now
Questions 6

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

Options:

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Buy Now
Questions 7

A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?

Options:

A.

EXPOSE 8080

B.

FIREWALL ADD-PORT 8080

C.

PORT 8080

D.

OPEN PORT 8080

Buy Now
Questions 8

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

Options:

A.

soak testing

B.

unit testing

C.

load testing

D.

volume testing

Buy Now
Questions 9

What are two benefits of Infrastructure as Code? (Choose two.)

Options:

A.

It enables continuous integration.

B.

It allows for management control.

C.

It ensures consistency.

D.

It improves application monitoring.

E.

It reduces risk.

Buy Now
Questions 10

Fill in the blanks to complete the statement.

When creating multiple containers, in order to allow communication with each other, you must create a_____________ of type_____________.

Options:

Buy Now
Questions 11

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

Options:

A.

The default path is not used.

B.

The volume is not created.

C.

The volume is created.

D.

The volume is created with errors.

Buy Now
Questions 12

Construct an Ansible script to gather information about target routers and then use it to apply no ip redirects to every interface on each device. Drag and drop the code from the bottom onto the correct location in the exhibit to complete the tasks section of the Ansible playbook so that it accomplishes your goal.

Options:

Buy Now
Questions 13

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.

Why did the pipeline fail to start?

Options:

A.

The CI server was not configured as a Git remote for the repository.

B.

The webhook call from the code repository did not reach the CI server.

C.

Configuration changes must be sent to the pipeline, which then updates the repository.

D.

The pipeline must be started manually after the code repository is updated.

Buy Now
Questions 14

Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.

Options:

Buy Now
Questions 15

Which description of a canary deployment is true?

Options:

A.

deployment by accident

B.

deployment that is rolled back automatically after a configurable amount of minutes

C.

deployment relating to data mining development

D.

deployment to a limited set of servers or users

Buy Now
Questions 16

What is a benefit of Infrastructure as Code for the cloud?

Options:

A.

It groups system downtime across the infrastructure

B.

It enables the user to automate deployments

C.

It does not require configuration.

D.

It is a cost effective solution for services

Buy Now
Questions 17

An interface on a router as a Layer 3 link has been configured to another device by updating an Ansible playbook that is executed via a CI/CD pipeline. The Ansible playbook was written to push the configuration change using the ios_config module. Which automated test validates that the interface is functioning as it should?

Options:

A.

Add a pipeline step that runs the playbook a second type. If it does not modify the device on the second run, then the interface is correctly configured.

B.

Automated testing is already built in because the playbook execution is successful only after Ansible validates that it applied the change.

C.

Add a pipeline step that captures and parses the packet flow for the interface.

D.

Add a pipeline step that captures and parses the show ip interface output so that the operational state can be referenced.

Buy Now
Questions 18

A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.

Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

Options:

A.

Store the access token with GitHub environment variables

B.

Store the access token with GitHub encrypted secrets

C.

Store the access token in an environment file in the repository

D.

Hard code the access token in the repository with Base64 encoding

Buy Now
Questions 19

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

Options:

A.

Jenkins

B.

Genie CLI

C.

Travis CI

D.

Python YAML data libraries

Buy Now
Questions 20

Which two statements about Infrastructure as Code are true? (Choose two.)

Options:

A.

Test-driven development practices make use of Infrastructure as Code.

B.

Infrastructure as Code refers to automated testing libraries.

C.

DevOps builds upon Infrastructure as Code.

D.

Infrastructure as Code is based on practices from software development.

E.

Infrastructure as Code must use the same programming language as the application.

Buy Now
Questions 21

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.

Which Kubernetes command confirms that the service is running and usable?

Options:

A.

kubectl -n Cisco get services | grep “Cisco-DB”

B.

kubectl -n Cisco get pods | grep “Cisco-DB”

C.

kubectl get pods | grep “Cisco-DB”

D.

kubectl -n Cisco get service | grep “Cisco-DB”

Buy Now
Questions 22

Refer to the exhibit.

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

Options:

A.

Reverse lookup the IP address to add a hostname field

B.

Convert the date to the time zone of the system

C.

Configure the Linux machine to add a UID field to messages

D.

Filter out the text of the message to speed up searches

Buy Now
Questions 23

What is a principle of chaos engineering?

Options:

A.

common user access on system monitoring infrastructure

B.

proactive testing based on system responsiveness

C.

prevent mistakes that cause infrastructure service disruption

D.

reactive system monitoring for network infrastructure outages

Buy Now
Questions 24

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.

Which approach accomplishes this goal?

Options:

A.

Give the accounts used in the CI/CD pipeline full administrative rights to all applications

B.

Use the same passwords across the entire CI/CD pipeline

C.

Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline

D.

Never use one-time passwords in CI/CD pipeline

Buy Now
Questions 25

Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.

Options:

Buy Now
Questions 26

Drag and drop the tools from the left onto the tools function on the right Not all options are used.

Options:

Buy Now
Questions 27

When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)

Options:

A.

mean time between success

B.

mean time to recover

C.

cone testing

D.

change lead time

E.

age of codebase

Buy Now
Questions 28

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Options:

Buy Now
Questions 29

Refer to the exhibit.

What are the properties of the load balancer in a Kubernetes environment?

Options:

A.

Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

B.

Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

C.

Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

D.

Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp

Buy Now
Questions 30

Drag and drop the code snippets from the bottom onto the boxes in the code in the Ansible playbook to restart multiple services in the correct sequence Not all options are used

Options:

Buy Now
Questions 31

Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used

Options:

Buy Now
Questions 32

What is a benefit of monitoring the CI/CD pipeline?

Options:

A.

troubleshoots distributed systems performance

B.

proactively deploys new servers if needed

C.

analyzes network outages that affect the network and server infrastructure

D.

provides insight into how efficiently the development team is operating

Buy Now
Questions 33

Refer to the exhibit.

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

Options:

A.

Reject string values that are greater than maximum size

B.

Use floating point instead of integer for rating to avoid overflow

C.

Validate the content of the name and address parameters

D.

Run the application in a Docker container

E.

Compile the application using Java HotSpot

Buy Now
Questions 34

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

Options:

A.

Add a unit test to block the secrets

B.

Add a precommit Git hook to block the secrets

C.

Add dast to the repository to block the secrets

D.

Add a job in the CI build to block the secrets

Buy Now
Questions 35

Refer to the exhibit.

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

Options:

A.

Change from a JDBC call to a HTTP call to retrieve data faster

B.

Run the AccountProfileMySQL service in Kubernetes

C.

Explore the JDBC queries looking for optimization opportunities

D.

Verify if the Docker container running MySQL is limiting CPU utilization

Buy Now
Questions 36

Drag and drop the scenarios from the left onto the cloud strategy categories on the right.

Options:

Buy Now
Questions 37

A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:

• Take a source Docker image named alpine

• Define two stages named build and push

• Check network connectivity before the stages run

• Fetch the latest Docker image

• Create a new Docker image and push it to the registry

• Tag the new Docker image as the latest version

Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.

Options:

Buy Now
Questions 38

Which two elements help to secure your API keys? (Choose two.)

Options:

A.

ramdomness

B.

SHA1

C.

triple AES

D.

rotation

E.

dictionary

Buy Now
Questions 39

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

Options:

A.

Dynamic Application Security Testing

B.

Runtime Application Health-Protection

C.

Continuous Application Security Testing

D.

Static Analysis Security Testing

Buy Now
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Jun 15, 2025
Questions: 114
300-910 pdf

300-910 PDF

$33.25  $94.99
300-910 Engine

300-910 Testing Engine

$38.5  $109.99
300-910 PDF + Engine

300-910 PDF + Testing Engine

$50.75  $144.99