web analytics

[12-Apr-2024] New 2020 DevNet 300-910 DEVOPS Dumps with VCE and PDF from PassLeader (Update Questions)

New 2020 DevNet 300-910 DEVOPS exam questions from PassLeader 300-910 dumps! Welcome to download the newest PassLeader 300-910 VCE and PDF dumps: https://www.passleader.com/300-910.html (136 Q&As)

P.S. Free 2020 DevNet 300-910 DEVOPS dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1ze9DbG_LglZraoq5nIX6X1-Ms9Hvkmxg

NEW QUESTION 101
A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver. In which file should the name of the middleware server be configured?

A.    Docker Service discovery daemon.
B.    Docker Swarm.
C.    Docker Compose.
D.    Dynamic Host Configuration Protocol.

Answer: A

NEW QUESTION 102
Which Kubernetes object ensures that each node is limited to running no more than one pod?

A.    UniCast
B.    Deployment
C.    DaemonSet
D.    ReplicaSet

Answer: C

NEW QUESTION 103
What are two testing scenarios of the chaos engineering principle? (Choose two.)

A.    maxing out CPU cores on an Elasticsearch duster
B.    removing all users from a version control system
C.    executing routine in driver code to emulate I/O errors
D.    blocking developers’building access
E.    unplugging a core switch device

Answer: AE

NEW QUESTION 104
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network. If an attacker gains access to the scripts, what is the risk exposure?

A.    The Automation server is at risk of being compromised.
B.    The Ansible scripts run through encrypted SSH connections.
C.    The internal network is at risk of being compromised.
D.    The entire CI/CD-related infrastructure is at risk.

Answer: C

NEW QUESTION 105
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company’s environment, but the pipeline fails when pushed. Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

A.    Remove the failing test.
B.    Manually deploy the change into the production environment.
C.    Use a backup pipeline.
D.    Replicate the production environment in the pipeline before applying.

Answer: D

NEW QUESTION 106
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost. Which action prevents new security threats in the environment?

A.    Use self-developed algorithms for encryption.
B.    Install virtual firewalls.
C.    Actively change the ISP provider.
D.    Apply all the latest patches and updates.

Answer: D

NEW QUESTION 107
What is a practice of infrastructure as code?

A.    Use multiple version control systems.
B.    Document as much as possible.
C.    Configure the deployment consistently.
D.    Test, integrate, and deploy once a day.

Answer: C

NEW QUESTION 108
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
– the CI/CD pipeline to spin up test instances
– instances must be used to validate changes
– changes must be validated prior to a continuous deployment workflow, and
– then push the changes to production
How should the pipeline target the required environment?

A.    Use separate CI servers for each environment.
B.    Use different pipelines for each environment.
C.    Use separate Git repositories for each environment.
D.    Use different inventory files for each environment.

Answer: D

NEW QUESTION 109
As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?

A.    Leverage machine learning tools to more quickly identify problems m syslog and SNMP data.
B.    Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols.
C.    Identify and capture the key performance indicators that describe the state of the network.
D.    Identify and fix network issues faster by leveraging streaming telemetry from network devices.

Answer: C

NEW QUESTION 110
What is a benefit of monitoring the CI/CD pipeline?

A.    troubleshoots distributed systems performance
B.    proactively deploys new servers if needed
C.    analyzes network outages that affect the network and server infrastructure
D.    provides insight into how efficiently the development team is operating

Answer: D

NEW QUESTION 111
What is a benefit of Infrastructure as Code for the cloud?

A.    It groups system downtime across the infrastructure.
B.    It enables the user to automate deployments.
C.    It does not require configuration.
D.    It is a cost effective solution for services.

Answer: B

NEW QUESTION 112
A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments. Which practice improves the consistency of the deployments?

A.    Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored.
B.    Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository.
C.    In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.
D.    Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently.

Answer: A

NEW QUESTION 113
A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions. Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

A.    Store the access token with GitHub environment variables.
B.    Store the access token with GitHub encrypted secrets.
C.    Store the access token in an environment file in the repository.
D.    Hard code the access token in the repository with Base64 encoding.

Answer: B

NEW QUESTION 114
What is the impact of using the Drone.io CI/CD tool on the local installation step?

A.    slows down the development
B.    delays the deployment of components
C.    speeds up the procedure
D.    complicates the application process

Answer: C

NEW QUESTION 115
A team is developing an application for end users. The application will use microservices. For user access dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verify that various user actions work as expected?

A.    unit
B.    end-to-end
C.    A/B
D.    sanity

Answer: B

NEW QUESTION 116
A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down. Which deployment strategy must be used?

A.    rolling
B.    blue/green
C.    shadow
D.    canary

Answer: B
Explanation:
The new version of the application is deployed to one of the environments, and then traffic is gradually shifted to the updated environment. This strategy allows the team to test the new version before releasing it to the public, ensuring that it is operating as expected. After the new version is tested and approved, traffic is fully shifted to the new environment and the old environment is shut down.

NEW QUESTION 117
Which approach must be used to integrate DevOps practices into the team structure in an existing organization?

A.    Create a team that can deliver all the stages with active cooperation between the team members.
B.    Create a team that can deliver all the stages with well-defined roles and a communication structure between team members.
C.    Create a team for each stage with structured communication channels.
D.    Create a team for each stage with active cooperation between the teams.

Answer: A

NEW QUESTION 118
An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build. Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)

A.    Changes must be scheduled to deploy at a specific time that has minimal traffic.
B.    Changes must include automated tests.
C.    Changes must be validated during deployment to the production environment.
D.    Smaller, individually testable changes must be merged first.
E.    Team members must be responsible for the code committed by any team member.

Answer: BC

NEW QUESTION 119
What is an advantage of using configuration management tools to automate infrastructure services?

A.    eliminates the need to run integration tests within the CI/CD pipeline
B.    provides high native monitoring of services
C.    eliminates the need for CI/CD tools
D.    integrates with container orchestration

Answer: C

NEW QUESTION 120
An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups. Which action must be used to prevent developers from accidentally committing secrets in the code?

A.    Add a unit test to block the secrets.
B.    Add a precommit Git hook to block the secrets.
C.    Add dast to the repository to block the secrets.
D.    Add a job in the CI build to block the secrets.

Answer: A

NEW QUESTION 121
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application. Which command validates the success of the application deployment?

A.    kubectl get pods -o wide -w
B.    kubectl rollout status deployment
C.    kubectl describe pods/
D.    kubectl rollout history deployment

Answer: B

NEW QUESTION 122
A developer is creating an application based on microservices. The application will be used as a central repository for all company’s documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time. Which metric must be used to trigger autoscaling events?

A.    network
B.    CPU/GPU
C.    disk I/O
D.    memory

Answer: B

NEW QUESTION 123
What is a capability of node-level logging in Kubernetes?

A.    Using the Kubernetes JSON logging driver enables log persistence.
B.    Output that is written to stdin is retrieved by using kubectl.
C.    Output that is written to stderr is not logged or retrievable by using kubectl.
D.    Using the local logging driver of Docker enables log persistence.

Answer: D

NEW QUESTION 124
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?

A.    prepares a new host to accept a hard drive image built on another machine
B.    removes all host-specific information and components from the local machine
C.    installs all the latest security patches and OS updates to the local machine
D.    writes the local hard drive image to an ISO file that can be deployed to another machine

Answer: B

NEW QUESTION 125
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible. Which approach accomplishes this goal?

A.    Give the accounts used in the CI/CD pipeline full administrative rights to all applications.
B.    Use the same passwords across the entire CI/CD pipeline.
C.    Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline.
D.    Never use one-time passwords in CI/CD pipeline.

Answer: C

NEW QUESTION 126
What is included in ansible playbook instructions?

A.    component dependencies
B.    end state of component
C.    machine dependencies
D.    beginning state of component

Answer: B

NEW QUESTION 127
A development team is using Cl/CD during application development. During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. A complete redesign o?the affected applications were required. To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline?

A.    source code analysis tools
B.    dynamic applications security testing
C.    threat modeling
D.    vulnerability management

Answer: A

NEW QUESTION 128
An IT team at a SaaS company has this Cl/CD pipeline Developers push code to the central repository by using Git. The code is packaged and sent by an automated process to the staging environment where the tests are executed again automatically. If the automated tests pass in staging the code is pushed to production. Which change improves the Cl/CD pipeline?

A.    QA must also run the tests manually in the staging environment.
B.    Operations must test in another environment before production.
C.    Run unit tests before build and stage testing.
D.    The developers run the unit tests manually instead of the QA team.

Answer: C

NEW QUESTION 129
What is a principle of chaos engineering?

A.    common user access on system monitoring infrastructure
B.    proactive testing based on system responsiveness
C.    prevent mistakes that cause infrastructure service disruption
D.    reactive system monitoring for network infrastructure outages

Answer: B

NEW QUESTION 130
An application communicates with multiple third-party services that use API keys. When stress testing the system, developers must change the URLs of the third-party services. The application must run on port 5000. But the developers must be able to change the port at runtime if required. Which configuration management approach simplifies the development workflow and reduces the configuration changes?

A.    secrets
B.    sane defaults
C.    application parameters
D.    config maps

Answer: C

NEW QUESTION 131
Drag and Drop
A developer must create a GitLab CI/CD pipeline with these requirements:
– builds an on-demand test environment
– deploys configurations
– verifies the results
Drag and drop the code from the bottom onto the box where the code is missing to complete the GitLab CI/CD pipeline. Not all options are used.
300-910-Exam-Dumps-1311

 

Answer:
300-910-Exam-Dumps-1312

 

NEW QUESTION 132
Drag and Drop
Drag and drop the scenarios from the left onto the cloud strategy categories on the right.
300-910-Exam-Dumps-1321

 

Answer:
300-910-Exam-Dumps-1322

 

NEW QUESTION 133
Drag and Drop
Drag and drop the code snippets from the bottom onto the boxes in the code to send a notification to a Cisco Webex space named NOC that has an ID of ab12cd. Not all options are used.
300-910-Exam-Dumps-1331

 

Answer:
300-910-Exam-Dumps-1332

 

NEW QUESTION 134
……


New 2020 DevNet 300-910 DEVOPS exam questions from PassLeader 300-910 dumps! Welcome to download the newest PassLeader 300-910 VCE and PDF dumps: https://www.passleader.com/300-910.html (136 Q&As)

P.S. Free 2020 DevNet 300-910 DEVOPS dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1ze9DbG_LglZraoq5nIX6X1-Ms9Hvkmxg