ExamGecko
Home Home / Cisco / 300-910

Cisco 300-910 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











What are two testing scenarios of the chaos engineering principle? (Choose two.)

A.

maxing out CPU cores on an Elasticsearch cluster

A.

maxing out CPU cores on an Elasticsearch cluster

Answers
B.

removing all users from a version control system

B.

removing all users from a version control system

Answers
C.

executing routine in driver code to emulate I/O errors

C.

executing routine in driver code to emulate I/O errors

Answers
D.

blocking developers’ building access

D.

blocking developers’ building access

Answers
E.

unplugging a core switch device

E.

unplugging a core switch device

Answers
Suggested answer: A, E

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.

If an attacker gains access to the scripts, what is the risk exposure?

A.

The Automation server is at risk of being compromised.

A.

The Automation server is at risk of being compromised.

Answers
B.

The Ansible scripts run through encrypted SSH connections.

B.

The Ansible scripts run through encrypted SSH connections.

Answers
C.

The internal network is at risk of being compromised.

C.

The internal network is at risk of being compromised.

Answers
D.

The entire CI/CD-related infrastructure is at risk.

D.

The entire CI/CD-related infrastructure is at risk.

Answers
Suggested answer: C

Explanation:

The internal network is at risk of being compromised if an attacker gains access to the Ansible scripts, as the scripts contain hardcoded secrets for the RDBMS which is accessible from a jump server in a public network. This presents a risk as the secrets can be used to gain access to the RDBMS, and from there, the attacker could potentially gain access to the internal network. Additionally, the entire CI/CD-related infrastructure could be at risk if the attacker is able to gain access to the RDBMS, as they could potentially manipulate the data or scripts in order to cause disruption or damage.

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

A.

Remove the failing test.

A.

Remove the failing test.

Answers
B.

Manually deploy the change into the production environment

B.

Manually deploy the change into the production environment

Answers
C.

Use a backup pipeline

C.

Use a backup pipeline

Answers
D.

Replicate the production environment in the pipeline before applying

D.

Replicate the production environment in the pipeline before applying

Answers
Suggested answer: D

Explanation:

This ensures that the change is applied in the same environment that it was tested in, and that the pipeline will pass. This is in accordance with the rule of a CI/CD pipeline that states that the same environment should be used for testing and deploying code into production. As stated in the Cisco Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Study Manual, “the same environment should be used for testing and deploying code into production, or the pipeline will fail.”

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

A.

Use self-developed algorithms for encryption

A.

Use self-developed algorithms for encryption

Answers
B.

Install virtual firewalls

B.

Install virtual firewalls

Answers
C.

Actively change the ISP provider

C.

Actively change the ISP provider

Answers
D.

Apply all the latest patches and updates

D.

Apply all the latest patches and updates

Answers
Suggested answer: D


What is a practice of infrastructure as code?

A.

Use multiple version control systems

A.

Use multiple version control systems

Answers
B.

Document as much as possible

B.

Document as much as possible

Answers
C.

Configure the deployment consistently

C.

Configure the deployment consistently

Answers
D.

Test, integrate, and deploy once a day

D.

Test, integrate, and deploy once a day

Answers
Suggested answer: C

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:

• the CI/CD pipeline to spin up test instances.

• instances must be used to validate changes.

• changes must be validated prior to a continuous deployment workflow, and

• then push the changes to production

How should the pipeline target the required environment?

A.

Use separate CI servers for each environment

A.

Use separate CI servers for each environment

Answers
B.

Use different pipelines for each environment

B.

Use different pipelines for each environment

Answers
C.

Use separate Git repositories for each environment

C.

Use separate Git repositories for each environment

Answers
D.

Use different inventory files for each environment

D.

Use different inventory files for each environment

Answers
Suggested answer: D

Refer to the exhibit.

How does the architecture respond to a usage spike?

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

A.

The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

Answers
B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

B.

The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

Answers
C.

The Orchestrator increases the resources assigned to containers to increase performance

C.

The Orchestrator increases the resources assigned to containers to increase performance

Answers
D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

D.

The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

Answers
Suggested answer: A

Refer to the exhibit.

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

A.

Change from a JDBC call to a HTTP call to retrieve data faster

A.

Change from a JDBC call to a HTTP call to retrieve data faster

Answers
B.

Run the AccountProfileMySQL service in Kubernetes

B.

Run the AccountProfileMySQL service in Kubernetes

Answers
C.

Explore the JDBC queries looking for optimization opportunities

C.

Explore the JDBC queries looking for optimization opportunities

Answers
D.

Verify if the Docker container running MySQL is limiting CPU utilization

D.

Verify if the Docker container running MySQL is limiting CPU utilization

Answers
Suggested answer: C

Refer to the exhibit.

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

A.

Reject string values that are greater than maximum size

A.

Reject string values that are greater than maximum size

Answers
B.

Use floating point instead of integer for rating to avoid overflow

B.

Use floating point instead of integer for rating to avoid overflow

Answers
C.

Validate the content of the name and address parameters

C.

Validate the content of the name and address parameters

Answers
D.

Run the application in a Docker container

D.

Run the application in a Docker container

Answers
E.

Compile the application using Java HotSpot

E.

Compile the application using Java HotSpot

Answers
Suggested answer: A, C

As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?

A.

Leverage machine learning tools to more quickly identify problems m syslog and SNMP data

A.

Leverage machine learning tools to more quickly identify problems m syslog and SNMP data

Answers
B.

Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols

B.

Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols

Answers
C.

Identify and capture the key performance indicators that describe the state of the network

C.

Identify and capture the key performance indicators that describe the state of the network

Answers
D.

Identify and fix network issues faster by leveraging streaming telemetry from network devices

D.

Identify and fix network issues faster by leveraging streaming telemetry from network devices

Answers
Suggested answer: C

Explanation:


Total 128 questions
Go to page: of 13