Pass the Cisco Cisco Certified DevNet Professional 300-910 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

An IT department needs to deploy a new application named ‘Entfin434772390’ across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named ‘Entfin02754932l’. Both versions of the application are running in the production environment.

Which release strategy should be used by the IT department?

Options:

A.

agile


B.

canary


C.

rollbacks


D.

blue/green


Expert Solution
Questions # 22:

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.

Which Kubernetes command confirms that the service is running and usable?

Options:

A.

kubectl -n Cisco get services | grep “Cisco-DB”


B.

kubectl -n Cisco get pods | grep “Cisco-DB”


C.

kubectl get pods | grep “Cisco-DB”


D.

kubectl -n Cisco get service | grep “Cisco-DB”


Expert Solution
Questions # 23:

A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.

Options:

A.

source code analysis tools


B.

dynamic applications security testing


C.

Threat modeling


D.

vulnerability management


Expert Solution
Questions # 24:

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

Options:

A.

soak testing


B.

unit testing


C.

load testing


D.

volume testing


Expert Solution
Questions # 25:

What is the impact of using the Drone.io CI/CD tool on the local installation step?

Options:

A.

slows down the development


B.

delays the deployment of components


C.

speeds up the procedure


D.

complicates the application process


Expert Solution
Questions # 26:

Refer to the exhibit.

Question # 26

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

Options:

A.

Reverse lookup the IP address to add a hostname field


B.

Convert the date to the time zone of the system


C.

Configure the Linux machine to add a UID field to messages


D.

Filter out the text of the message to speed up searches


Expert Solution
Questions # 27:

Refer to the exhibit.

Question # 27

The push_configs.yml playbook returns the error shown.

Which action resolves the error?

Options:

A.

Install the Paramiko library on the host that runs Ansible


B.

Generate a new SSH key pair and add the public key to the target machine


C.

Export the ANSIBLE_HOST_KEY_CHECKING=False variable


D.

Comment out the StrictHostKeyChecking=yes line from ansible.cfg


Expert Solution
Questions # 28:

A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?

Options:

A.

recreate


B.

blue/green


C.

rolling


D.

canary


Expert Solution
Questions # 29:

A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)

Options:

A.

Apply


B.

Install


C.

Deploy


D.

Create


E.

Expose


Expert Solution
Questions # 30:

What is a principle of chaos engineering?

Options:

A.

common user access on system monitoring infrastructure


B.

proactive testing based on system responsiveness


C.

prevent mistakes that cause infrastructure service disruption


D.

reactive system monitoring for network infrastructure outages


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions