ExamGecko
Home Home / Cisco / 300-910

Cisco 300-910 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?

A.

encode the value with base64 in a secure DNS CTEXT entry

A.

encode the value with base64 in a secure DNS CTEXT entry

Answers
B.

as an environment variable in the Dockerfile

B.

as an environment variable in the Dockerfile

Answers
C.

Docker environment variable

C.

Docker environment variable

Answers
D.

Docker secrets

D.

Docker secrets

Answers
Suggested answer: D

Explanation:

a docker secret is a blob of data, such as a password, SSH private key, SSL certificate, or another piece of data that should not be transmitted over a network or stored unencrypted in a Dockerfile or in your application's source code

How does eliminating hardcoded or default passwords help to secure an environment?

A.

helps by enforcing your password in a repository and storing it in a secure vault

A.

helps by enforcing your password in a repository and storing it in a secure vault

Answers
B.

helps to manage passwords centrally

B.

helps to manage passwords centrally

Answers
C.

helps penetration testing team to focus on other issues more efficiently

C.

helps penetration testing team to focus on other issues more efficiently

Answers
D.

helps by removing back doors in your environments

D.

helps by removing back doors in your environments

Answers
Suggested answer: A

Explanation:

https://www.beyondtrust.com/resources/glossary/hardcoded-embedded-passwords

What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?

A.

cost

A.

cost

Answers
B.

metrics and monitoring

B.

metrics and monitoring

Answers
C.

hardware maintenance

C.

hardware maintenance

Answers
D.

credentials management

D.

credentials management

Answers
Suggested answer: D

Explanation:

The responsibility of credentials management is less of a concern when running in the public cloud.

This is because the public cloud provider typically manages the credentials and handles authentication and authorization for the cloud services. In a private cloud environment, the organization must manage the credentials themselves, as well as authentication and authorization for the cloud services.

Reference: Cisco Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Study Manual, Chapter 2, Section 2.1: Cloud Computing Models, Page 14-15.

Which two elements help to secure your API keys? (Choose two.)

A.

ramdomness

A.

ramdomness

Answers
B.

SHA1

B.

SHA1

Answers
C.

triple AES

C.

triple AES

Answers
D.

rotation

D.

rotation

Answers
E.

dictionary

E.

dictionary

Answers
Suggested answer: A, C

Refer to the exhibit.

The snippet contains the JSON string that will be sent to the Prometheus AlertManager to silence an alert. AlertManager accepts only the content type of application 'json'' Which Python code correctly sends an API call to perform action?

A.

respone= request.post(url. json=json_data)

A.

respone= request.post(url. json=json_data)

Answers
B.

respone= request.post(url. json=json.loads(json_data)

B.

respone= request.post(url. json=json.loads(json_data)

Answers
C.

respone= request.post(url. data=json_data)

C.

respone= request.post(url. data=json_data)

Answers
D.

respone= request.post(url, data=json=(json_data)

D.

respone= request.post(url, data=json=(json_data)

Answers
Suggested answer: C

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.

In which file should the name of the middleware server be configured?

A.

Docker Service discovery daemon

A.

Docker Service discovery daemon

Answers
B.

Docker Swarm

B.

Docker Swarm

Answers
C.

Docker Compose

C.

Docker Compose

Answers
D.

Dynamic Host Configuration Protocol

D.

Dynamic Host Configuration Protocol

Answers
Suggested answer: A

Which Kubernetes object ensures that each node is limited to running no more than one pod?

A.

UniCast

A.

UniCast

Answers
B.

Deployment

B.

Deployment

Answers
C.

DaemonSet

C.

DaemonSet

Answers
D.

ReplicaSet

D.

ReplicaSet

Answers
Suggested answer: C

Refer to the exhibit.

What are the properties of the load balancer in a Kubernetes environment?

A.

Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

A.

Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

Answers
B.

Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

B.

Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

Answers
C.

Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

C.

Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

Answers
D.

Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 andhttp-port2 of nginxapp

D.

Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 andhttp-port2 of nginxapp

Answers
Suggested answer: B

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

A.

A hostgroup must be defined

A.

A hostgroup must be defined

Answers
B.

The “_type” must represent the process type

B.

The “_type” must represent the process type

Answers
C.

The priority of the message must be to the server

C.

The priority of the message must be to the server

Answers
D.

The process name in the message must be parsed into a field

D.

The process name in the message must be parsed into a field

Answers
Suggested answer: B

Refer to the exhibit.

The push_configs.yml playbook returns the error shown.

Which action resolves the error?

A.

Install the Paramiko library on the host that runs Ansible

A.

Install the Paramiko library on the host that runs Ansible

Answers
B.

Generate a new SSH key pair and add the public key to the target machine

B.

Generate a new SSH key pair and add the public key to the target machine

Answers
C.

Export the ANSIBLE_HOST_KEY_CHECKING=False variable

C.

Export the ANSIBLE_HOST_KEY_CHECKING=False variable

Answers
D.

Comment out the StrictHostKeyChecking=yes line from ansible.cfg

D.

Comment out the StrictHostKeyChecking=yes line from ansible.cfg

Answers
Suggested answer: D
Total 128 questions
Go to page: of 13