ExamGecko
Home Home / Cisco / 300-910

Cisco 300-910 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?

A.

AMQP

A.

AMQP

Answers
B.

SNMP

B.

SNMP

Answers
C.

SSH

C.

SSH

Answers
D.

REST

D.

REST

Answers
Suggested answer: D

Explanation:

The most commonly used interface to integrate logging, monitoring, and alerting applications into your CI/CD pipeline is REST. Representational State Transfer (REST) is an architectural style that defines a set of constraints and properties based on HTTP. It enables developers to create APIs that are easy to use and access, and is well-suited for integrating logging, monitoring, and alerting applications into your CI/CD pipeline.

To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?

A.

Configure a new JSON object in Kibana.

A.

Configure a new JSON object in Kibana.

Answers
B.

Create a search index in Logstash.

B.

Create a search index in Logstash.

Answers
C.

Create an index pattern in Kibana.

C.

Create an index pattern in Kibana.

Answers
D.

Create a time filter on Kibana to look at time only.

D.

Create a time filter on Kibana to look at time only.

Answers
Suggested answer: C

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored?

(Choose two.)

A.

node

A.

node

Answers
B.

app

B.

app

Answers
C.

agent

C.

agent

Answers
D.

tier

D.

tier

Answers
E.

event

E.

event

Answers
Suggested answer: A, D

Explanation:

Appdynamics Agents Install Wizard Step 2 Enter the configuration values...

https://docs.appdynamics.com/appd/4.5.x/en/application-monitoring/install-app-serveragents#InstallAppServerAgents-UsetheGettingStartedWizard Tier and Node Naming Guidelines

https://docs.appdynamics.com/appd/4.5.x/en/application-monitoring/install-app-serveragents#InstallAppServerAgents-tier-node-namingTierandNodeNamingGuidelines

The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays.

Where in the interface does AppDynamics bring this to your attention?

A.

Potential Issues section of an individual transaction

A.

Potential Issues section of an individual transaction

Answers
B.

Transaction Score graph of a business transaction

B.

Transaction Score graph of a business transaction

Answers
C.

Code Deadlock section of the Event List

C.

Code Deadlock section of the Event List

Answers
D.

Slow Calls and Errors tab of the application

D.

Slow Calls and Errors tab of the application

Answers
Suggested answer: A

Explanation:

https://docs.appdynamics.com/display/PRO43/Thread+Contention

What are two advantages of using Configuration Management Tools? (Choose two.)

A.

reduction in policy violations caused by human errors

A.

reduction in policy violations caused by human errors

Answers
B.

reduction in administration costs

B.

reduction in administration costs

Answers
C.

reduction in network changes already performed automatically

C.

reduction in network changes already performed automatically

Answers
D.

reduction of on-premises networking equipment

D.

reduction of on-premises networking equipment

Answers
E.

reduction in networking team skills

E.

reduction in networking team skills

Answers
Suggested answer: A, B

Explanation:

Configuration Management Tools allow for automated configuration of networking equipment, which helps to reduce human errors and the time and money needed to manage and configure the equipment. For example, Cisco Configuration

Professional (CCP) is a configuration management tool that provides automated configuration, validation, and troubleshooting of network infrastructure devices. CCP enables administrators to configure and deploy network changes quickly and efficiently, while also reducing the costs associated with manual configuration and troubleshooting.

An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?

A.

Check to make sure Nginx is running.

A.

Check to make sure Nginx is running.

Answers
B.

Check for response times in Nginx logs.

B.

Check for response times in Nginx logs.

Answers
C.

Check to make sure the web API response is coming back in JSON.

C.

Check to make sure the web API response is coming back in JSON.

Answers
D.

Check the size of the database that the application is using.

D.

Check the size of the database that the application is using.

Answers
Suggested answer: B

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

Answers
B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

Answers
C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

Answers
D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Answers
Suggested answer: C

Explanation:

The ELK Stack (Elasticsearch, Logstash, and Kibana) can handle ingesting unstructured logs from various devices in different formats by running custom filters on the logs. The filters are designed to parse the log data and extract the relevant, structured information from it, which is then stored for later analysis. This allows for faster and more accurate analysis of the data, and enables more sophisticated insights to be drawn from it.

What is chaos engineering?

A.

designing an application with fuzzy logic that makes it hard to predict

A.

designing an application with fuzzy logic that makes it hard to predict

Answers
B.

a product engineering approach that lacks a formal methodology

B.

a product engineering approach that lacks a formal methodology

Answers
C.

splitting a project between teams that do not communicate with each other

C.

splitting a project between teams that do not communicate with each other

Answers
D.

introducing problems into a system to study behavior and improve reliability

D.

introducing problems into a system to study behavior and improve reliability

Answers
Suggested answer: D

A developer is nearing the end of a software development cycle and is ready to deploy the software.

The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address?

(Choose two.)

A.

performing code reviews

A.

performing code reviews

Answers
B.

requirement gathering

B.

requirement gathering

Answers
C.

change management process

C.

change management process

Answers
D.

new code scanning

D.

new code scanning

Answers
E.

rollback plans

E.

rollback plans

Answers
Suggested answer: A, D

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A.

Dynamic Application Security Testing

A.

Dynamic Application Security Testing

Answers
B.

Runtime Application Health-Protection

B.

Runtime Application Health-Protection

Answers
C.

Continuous Application Security Testing

C.

Continuous Application Security Testing

Answers
D.

Static Analysis Security Testing

D.

Static Analysis Security Testing

Answers
Suggested answer: D
Total 128 questions
Go to page: of 13