Refer to the exhibit.
The push_configs.yml playbook returns the error shown.
Which action resolves the error?
A. Install the Paramiko library on the host that runs Ansible
B. Generate a new SSH key pair and add the public key to the target machine
C. Export the ANSIBLE_HOST_KEY_CHECKING=False variable
D. Comment out the StrictHostKeyChecking=yes line from ansible.cfg
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.
If an attacker gains access to the scripts, what is the risk exposure?
A. The Automation server is at risk of being compromised.
B. The Ansible scripts run through encrypted SSH connections.
C. The internal network is at risk of being compromised.
D. The entire CI/CD-related infrastructure is at risk.
Which two elements help to secure your API keys? (Choose two.)
A. ramdomness
B. SHA1
C. triple AES
D. rotation
E. dictionary
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?
A. Option A
B. Option B
C. Option C
D. Option D
Refer to the exhibit.
A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?
A. The CI/CD system is configured incorrectly to import the dependencies to the code
B. The code is pushed incorrectly to the CI/CD system
C. The version of Python is wrong in the CI/CD pipeline
D. The CI/CD system is configured incorrectly to download the required dependencies
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?
A. cost
B. metrics and monitoring
C. hardware maintenance
D. credentials management
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)
A. performing code reviews
B. requirement gathering
C. change management process
D. new code scanning
E. rollback plans
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?
A. Dynamic Application Security Testing
B. Runtime Application Health-Protection
C. Continuous Application Security Testing
D. Static Analysis Security Testing
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
A. encode the value with base64 in a secure DNS CTEXT entry
B. as an environment variable in the Dockerfile
C. Docker environment variable
D. Docker secrets
How does eliminating hardcoded or default passwords help to secure an environment?
A. helps by enforcing your password in a repository and storing it in a secure vault
B. helps to manage passwords centrally
C. helps penetration testing team to focus on other issues more efficiently
D. helps by removing back doors in your environments
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 300-910 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.