Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Questions and Answers

Questions 4

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.

Which Kubernetes command confirms that the service is running and usable?

Options:

A.

kubectl -n Cisco get services | grep “Cisco-DB”

B.

kubectl -n Cisco get pods | grep “Cisco-DB”

C.

kubectl get pods | grep “Cisco-DB”

D.

kubectl -n Cisco get service | grep “Cisco-DB”

Buy Now
Questions 5

Refer to the exhibit A DevOps engineer is responsible for monitoring a mission-critical app During normal operations, when opening the application dashboard, it has been noticed that Ecom-Tier1 suddenly turns partially red Which action must be taken to address the Ecom-Tier1 turning red?

Options:

A.

Restart the service to re-establish the connection with the nodes and clear the path.

B.

Decrease the load on the MySQL databases to release the hardware resources available for node distribution

C.

Check with the planning team to understand if the number of nodes in the Ecom tier can be increased to handle traffic

D.

Contact the network team to investigate the network path that caused this intermittent issue around 9.10.

Buy Now
Questions 6

An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.

Which action prevents new security threats in the environment?

Options:

A.

Use self-developed algorithms for encryption

B.

Install virtual firewalls

C.

Actively change the ISP provider

D.

Apply all the latest patches and updates

Buy Now
Questions 7

Drag and drop the code snippets from the bottom onto the boxes in the code in the Ansible playbook to restart multiple services in the correct sequence Not all options are used

Options:

Buy Now
Questions 8

What is included in ansible playbook instructions?

Options:

A.

component dependencies

B.

end state of component

C.

machine dependencies

D.

beginning state of component

Buy Now
Questions 9

An engineer is developing a script that must call an API using a static Bearer token Which solution securely protects the credentials from being retrievable from the source code?

A)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 10

Fill in the blanks to describe the concepts of extending DevOps practices to the network for NetDevOps.

NetDevOps builds and manages networks as a system that enables network services to be consumed in a DevOps approach. Organizations practicing NetDevOps see changes in the__________ as routine and expected activities, with a well-defined and practiced process for_____________, testing, and _____________ network changes. By making them routine, network changes can be small and simple.

Options:

Buy Now
Questions 11

Refer to the exhibit.

Which CI solution uses this file?

Options:

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jenkins

Buy Now
Questions 12

A DevOps engineer is designing a precheck validation of the network state in a CI/CD pipeline and must implement this workflow:

• Take a source Docker image named alpine

• Define two stages named build and push

• Check network connectivity before the stages run

• Fetch the latest Docker image

• Create a new Docker image and push it to the registry

• Tag the new Docker image as the latest version

Drag and drop the code snippets from the bottom onto the boxes in the GitLab CI configuration to achieve the requirements for the design. Not all options are used.

Options:

Buy Now
Questions 13

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.

If an attacker gains access to the scripts, what is the risk exposure?

Options:

A.

The Automation server is at risk of being compromised.

B.

The Ansible scripts run through encrypted SSH connections.

C.

The internal network is at risk of being compromised.

D.

The entire CI/CD-related infrastructure is at risk.

Buy Now
Questions 14

An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.

Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)

Options:

A.

Changes must be scheduled to deploy at a specific time that has minimal traffic

B.

Changes must include automated tests

C.

Changes must be validated during deployment to the production environment

D.

Smaller, individually testable changes must be merged first

E.

Team members must be responsible for the code committed by any team member

Buy Now
Questions 15

What is a principle of chaos engineering?

Options:

A.

common user access on system monitoring infrastructure

B.

proactive testing based on system responsiveness

C.

prevent mistakes that cause infrastructure service disruption

D.

reactive system monitoring for network infrastructure outages

Buy Now
Questions 16

The IaC configuration for an application is being deployed using a CI/CD pipeline. Drag and drop the steps for this pipeline from the left into the correct order that they would be executed on the right. Not all options are used.

Options:

Buy Now
Questions 17

A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?

Options:

A.

Unit

B.

End-to-end

C.

A/B

D.

sanity

Buy Now
Questions 18

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Options:

Buy Now
Questions 19

An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?

Options:

A.

Check to make sure Nginx is running.

B.

Check for response times in Nginx logs.

C.

Check to make sure the web API response is coming back in JSON.

D.

Check the size of the database that the application is using.

Buy Now
Questions 20

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

Options:

A.

soak testing

B.

unit testing

C.

load testing

D.

volume testing

Buy Now
Questions 21

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

Options:

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Buy Now
Questions 22

Drag and drop the operations from the left into the correct order on the right when using CI/CD, assuming that there are no failures or conflicts.

Options:

Buy Now
Questions 23

A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.

Which practice improves the consistency of the deployments?

Options:

A.

Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored

B.

Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository

C.

In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.

D.

Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently

Buy Now
Questions 24

Refer to the exhibit.

The push_configs.yml playbook returns the error shown.

Which action resolves the error?

Options:

A.

Install the Paramiko library on the host that runs Ansible

B.

Generate a new SSH key pair and add the public key to the target machine

C.

Export the ANSIBLE_HOST_KEY_CHECKING=False variable

D.

Comment out the StrictHostKeyChecking=yes line from ansible.cfg

Buy Now
Questions 25

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

Options:

A.

Jenkins

B.

Genie CLI

C.

Travis CI

D.

Python YAML data libraries

Buy Now
Questions 26

Which two elements help to secure your API keys? (Choose two.)

Options:

A.

ramdomness

B.

SHA1

C.

triple AES

D.

rotation

E.

dictionary

Buy Now
Questions 27

What is an advantage of using configuration management tools to automate infrastructure services?

Options:

A.

eliminates the need to run integration tests within the CI/CD pipeline

B.

provides high native monitoring of services

C.

eliminates the need for CI/CD tools

D.

integrates with container orchestration

Buy Now
Questions 28

Drag and drop the steps in Gartner's public cloud cost management framework from the left into the order on the right.

Options:

Buy Now
Questions 29

What is chaos engineering?

Options:

A.

designing an application with fuzzy logic that makes it hard to predict

B.

a product engineering approach that lacks a formal methodology

C.

splitting a project between teams that do not communicate with each other

D.

introducing problems into a system to study behavior and improve reliability

Buy Now
Questions 30

A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.

Which command does the pipeline run to accomplish this goal?

Options:

A.

terraform plan

B.

terraform check

C.

terraform fmt

D.

terraform validate

Buy Now
Questions 31

Refer to the exhibit.

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

Options:

A.

Base Alter: TextMessage

B.

Undefined: TextMessageBase

C.

TextMessage -> Base

D.

TextMessage -> Alter Base

Buy Now
Questions 32

Refer to the exhibit.

An application for data storing and processing has been created. The application is time-sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application.

Which action will help resolve the errors?

Options:

A.

Rewrite the SQL query identified in the transaction to be more efficient

B.

Log in to the node directly and investigate the errors by reviewing log files

C.

Drill down to investigate and identify the errors

D.

Scale out the node horizontally

Buy Now
Questions 33

What are two benefits of Infrastructure as Code? (Choose two.)

Options:

A.

It enables continuous integration.

B.

It allows for management control.

C.

It ensures consistency.

D.

It improves application monitoring.

E.

It reduces risk.

Buy Now
Questions 34

A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)

Options:

A.

Apply

B.

Install

C.

Deploy

D.

Create

E.

Expose

Buy Now
Questions 35

Refer to the exhibit.

Which action allows the development team to reach the deployed application?

Options:

A.

Create an init container to initialize routes for the containers in the pod

B.

Create a service to expose the logic running in the pod

C.

Delete the deployment and redeploy by using a ReplicaSet.

D.

Delete the deployment and redeploy by using the latest tag for the container image

Buy Now
Questions 36

Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.

Options:

Buy Now
Questions 37

Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)

Options:

A.

It runs unit tests against code that is committed.

B.

It builds your software on the production environment.

C.

It builds your software when changes are committed.

D.

It builds your software every 500 milliseconds.

E.

It must have a plug-in for Puppet and Maven.

Buy Now
Questions 38

To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?

Options:

A.

Configure a new JSON object in Kibana.

B.

Create a search index in Logstash.

C.

Create an index pattern in Kibana.

D.

Create a time filter on Kibana to look at time only.

Buy Now
Questions 39

Which Dockerfile yields the most predictable builds?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 300-910
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Jun 16, 2025
Questions: 114
300-910 pdf

300-910 PDF

$33.25  $94.99
300-910 Engine

300-910 Testing Engine

$38.5  $109.99
300-910 PDF + Engine

300-910 PDF + Testing Engine

$50.75  $144.99