Cisco 300-910 Practice Test - Questions Answers, Page 7

List of questions
Question 61

What are two testing scenarios of the chaos engineering principle? (Choose two.)
Question 62

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.
If an attacker gains access to the scripts, what is the risk exposure?
Question 63

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
Question 64

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
Question 65

What is a practice of infrastructure as code?
Question 66

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
β’ the CI/CD pipeline to spin up test instances.
β’ instances must be used to validate changes.
β’ changes must be validated prior to a continuous deployment workflow, and
β’ then push the changes to production
How should the pipeline target the required environment?
Question 67

Refer to the exhibit.
How does the architecture respond to a usage spike?
Question 68

Refer to the exhibit.
A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.
Which action resolves the issue?
Question 69

Refer to the exhibit.
An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
Question 70

As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?
Question