Refer to the exhibit.
Which action allows the development team to reach the deployed application?
A. Create an init container to initialize routes for the containers in the pod
B. Create a service to expose the logic running in the pod
C. Delete the deployment and redeploy by using a ReplicaSet.
D. Delete the deployment and redeploy by using the latest tag for the container image
What are two testing scenarios of the chaos engineering principle? (Choose two.)
A. maxing out CPU cores on an Elasticsearch cluster
B. removing all users from a version control system
C. executing routine in driver code to emulate I/O errors
D. blocking developers' building access
E. unplugging a core switch device
Refer to the exhibit.
Which CI solution uses this file?
A. Drone
B. GitLab CI
C. Travis CI
D. Jenkins
Refer to the exhibit.
A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?
A. Base Alter: TextMessage
B. Undefined: TextMessageBase
C. TextMessage -> Base
D. TextMessage -> Alter Base
Refer to the exhibit.
What are the properties of the load balancer in a Kubernetes environment?
A. Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1
B. Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port
C. Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp
D. Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp
Refer to the exhibit.
An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
A. Reject string values that are greater than maximum size
B. Use floating point instead of integer for rating to avoid overflow
C. Validate the content of the name and address parameters
D. Run the application in a Docker container
E. Compile the application using Java HotSpot
Refer to the exhibit.
An organization has issues with code-based failures after implementing a CI/CD pipeline to automate the builds and deployment phases of an application.
Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a successful continuous deployment?
A. Restructuring and monitoring tests must be run after it is promoted to production
B. Restructuring and monitoring tests must be run before it is promoted to production
C. Functional and nonfunctional tests must be run after it is promoted to production
D. Functional and nonfunctional tests must be run before it is promoted to production
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?
A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications
B. Use the same passwords across the entire CI/CD pipeline
C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
D. Never use one-time passwords in CI/CD pipeline
A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.
Which metric must be used to trigger autoscaling events?
A. network
B. CPU/GPU
C. disk I/O
D. memory
As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?
A. Leverage machine learning tools to more quickly identify problems m syslog and SNMP data
B. Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols
C. Identify and capture the key performance indicators that describe the state of the network
D. Identify and fix network issues faster by leveraging streaming telemetry from network devices
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 300-910 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.