Cisco 300-910 Practice Test - Questions Answers, Page 7
List of questions
Related questions
What are two testing scenarios of the chaos engineering principle? (Choose two.)
maxing out CPU cores on an Elasticsearch cluster
removing all users from a version control system
executing routine in driver code to emulate I/O errors
blocking developers’ building access
unplugging a core switch device
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.
If an attacker gains access to the scripts, what is the risk exposure?
The Automation server is at risk of being compromised.
The Ansible scripts run through encrypted SSH connections.
The internal network is at risk of being compromised.
The entire CI/CD-related infrastructure is at risk.
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
Remove the failing test.
Manually deploy the change into the production environment
Use a backup pipeline
Replicate the production environment in the pipeline before applying
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
Use self-developed algorithms for encryption
Install virtual firewalls
Actively change the ISP provider
Apply all the latest patches and updates
What is a practice of infrastructure as code?
Use multiple version control systems
Document as much as possible
Configure the deployment consistently
Test, integrate, and deploy once a day
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
• the CI/CD pipeline to spin up test instances.
• instances must be used to validate changes.
• changes must be validated prior to a continuous deployment workflow, and
• then push the changes to production
How should the pipeline target the required environment?
Use separate CI servers for each environment
Use different pipelines for each environment
Use separate Git repositories for each environment
Use different inventory files for each environment
Refer to the exhibit.
How does the architecture respond to a usage spike?
The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly
The database prioritizes quick and immediate queries over complicated ones to reduce the request queue
The Orchestrator increases the resources assigned to containers to increase performance
The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests
Refer to the exhibit.
A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.
Which action resolves the issue?
Change from a JDBC call to a HTTP call to retrieve data faster
Run the AccountProfileMySQL service in Kubernetes
Explore the JDBC queries looking for optimization opportunities
Verify if the Docker container running MySQL is limiting CPU utilization
Refer to the exhibit.
An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
Reject string values that are greater than maximum size
Use floating point instead of integer for rating to avoid overflow
Validate the content of the name and address parameters
Run the application in a Docker container
Compile the application using Java HotSpot
As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?
Leverage machine learning tools to more quickly identify problems m syslog and SNMP data
Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols
Identify and capture the key performance indicators that describe the state of the network
Identify and fix network issues faster by leveraging streaming telemetry from network devices
Question