ExamGecko
Home / Cisco / 300-910 / List of questions
Ask Question

Cisco 300-910 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

What are two testing scenarios of the chaos engineering principle? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.

If an attacker gains access to the scripts, what is the risk exposure?

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.

Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse


What is a practice of infrastructure as code?

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:

β€’ the CI/CD pipeline to spin up test instances.

β€’ instances must be used to validate changes.

β€’ changes must be validated prior to a continuous deployment workflow, and

β€’ then push the changes to production

How should the pipeline target the required environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

Refer to the exhibit.

Cisco 300-910 image Question 67 115238 10102024232858000000

How does the architecture respond to a usage spike?

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

Refer to the exhibit.

Cisco 300-910 image Question 68 115239 10102024232858000000

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

Refer to the exhibit.

Cisco 300-910 image Question 69 115240 10102024232858000000

An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.

Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?

Become a Premium Member for full access
  Unlock Premium Member
Total 128 questions
Go to page: of 13
Search

Related questions