image


300-910 Dumps

300-910 Braindumps

300-910 Real Questions

300-910 Practice Test

300-910 Actual Questions


Cisco


300-910


Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)


https://killexams.com/pass4sure/exam-detail/300-910

QUESTION 46 What are two advantages of using Configuration Management Tools? (Choose two.)


  1. reduction in policy violations caused by human errors

  2. reduction in administration costs

  3. reduction in network changes already performed automatically

  4. reduction of on-premises networking equipment

  5. reduction in networking team skills


Answer: BC

Section: Logging, Monitoring, and Metrics


QUESTION 47

An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?


  1. Check to make sure Nginx is running.

  2. Check for response times in Nginx logs.

  3. Check to make sure the web API response is coming back in JSON.

  4. Check the size of the database that the application is using.


Correct Answer: B

Section: Logging, Monitoring, and Metrics


QUESTION 48

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?


  1. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

  2. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

  3. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

  4. A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.


Answer: D

Section: Logging, Monitoring, and Metrics


QUESTION 49

What is chaos engineering?


  1. designing an application with fuzzy logic that makes it hard to predict

  2. a product engineering approach that lacks a formal methodology

  3. splitting a project between teams that do not communicate with each other

  4. introducing problems into a system to study behavior and improve reliability


Answer: D

Section: Logging, Monitoring, and Metrics Explanation


QUESTION 50

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)


  1. performing code reviews

  2. requirement gathering

  3. change management process

  4. new code scanning

  5. rollback plans


Answer: AC

Section: Security


QUESTION 51

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?


  1. Dynamic Application Security Testing

  2. Runtime Application Health-Protection

  3. Continuous Application Security Testing

  4. Static Analysis Security Testing


Answer: D

Section: Security


QUESTION 52

Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?


  1. encode the value with base64 in a secure DNS CTEXT entry

  2. as an environment variable in the Dockerfile

  3. Docker environment variable

  4. Docker secrets


Answer: D

Section: Security


QUESTION 53 How does eliminating hardcoded or default passwords help to secure an environment?


  1. helps by enforcing your password in a repository and storing it in a secure vault

  2. helps to manage passwords centrally

  3. helps penetration testing team to focus on other issues more efficiently

  4. helps by removing back doors in your environments


Answer: A

Section: Security


QUESTION 54 What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?


  1. cost

  2. metrics and monitoring

  3. hardware maintenance

  4. credentials management


Answer: D

Section: Security


Explanation/Reference:


QUESTION 55 Which two elements help to secure your API keys? (Choose two.)


  1. ramdomness

  2. SHA1

  3. triple AES

  4. rotation

  5. dictionary


Answer: AC

Section: Security


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG