Refer to the exhibit.
A docker-compose.yml file implements a postgres database container.
Which .gitlab-ci.yml code block checks the health status of the container and stops the pipeline if the container is unhealthy?
A. Option A
B. Option B
C. Option C
D. Option D
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
1.
the CI/CD pipeline to spin up test instances.
2.
instances must be used to validate changes.
3.
changes must be validated prior to a continuous deployment workflow, and
4.
then push the changes to production
How should the pipeline target the required environment?
A. Use separate CI servers for each environment
B. Use different pipelines for each environment
C. Use separate Git repositories for each environment
D. Use different inventory files for each environment
Which Kubernetes object ensures that each node is limited to running no more than one pod?
A. UniCast
B. Deployment
C. DaemonSet
D. ReplicaSet
Refer to the exhibit.
An application for data storing and processing has been created. The application is time- sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application. Which action will help resolve the errors?
A. Rewrite the SQL query identified in the transaction to be more efficient
B. Log in to the node directly and investigate the errors by reviewing log files
C. Drill down to investigate and identify the errors
D. Scale out the node horizontally
A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.
In which file should the name of the middleware server be configured?
A. Docker Service discovery daemon
B. Docker Swarm
C. Docker Compose
D. Dynamic Host Configuration Protocol
A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.
Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?
A. Store the access token with GitHub environment variables
B. Store the access token with GitHub encrypted secrets
C. Store the access token in an environment file in the repository
D. Hard code the access token in the repository with Base64 encoding
Refer to the exhibit.
A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.
Which action resolves the issue?
A. Change from a JDBC call to a HTTP call to retrieve data faster
B. Run the AccountProfileMySQL service in Kubernetes
C. Explore the JDBC queries looking for optimization opportunities
D. Verify if the Docker container running MySQL is limiting CPU utilization
An IT department needs to deploy a new application named `Entfin434772390' across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named `Entfin02754932l'. Both versions of the application are running in the production environment.
Which release strategy should be used by the IT department?
A. agile
B. canary
C. rollbacks
D. blue/green
A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.
Which practice improves the consistency of the deployments?
A. Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored
B. Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository
C. In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.
D. Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.
Which command validates the success of the application deployment?
A. kubectl get pods -o wide -w
B. kubectl rollout status deployment
C. kubectl describe pods/
D. kubectl rollout history deployment
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 300-910 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.