Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-910 Cisco Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-910 Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 114 questions

Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?

A.

encode the value with base64 in a secure DNS CTEXT entry

B.

as an environment variable in the Dockerfile

C.

Docker environment variable

D.

Docker secrets

Which two statements about Infrastructure as Code are true? (Choose two.)

A.

Test-driven development practices make use of Infrastructure as Code.

B.

Infrastructure as Code refers to automated testing libraries.

C.

DevOps builds upon Infrastructure as Code.

D.

Infrastructure as Code is based on practices from software development.

E.

Infrastructure as Code must use the same programming language as the application.

A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.

A.

source code analysis tools

B.

dynamic applications security testing

C.

Threat modeling

D.

vulnerability management

A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?

A.

Ansible

B.

pyATS

C.

Genie CLI

D.

Travis CI

Refer to the exhibit.

An application for data storing and processing has been created. The application is time-sensitive and manages confidential data AppDynamics identifies error transactions within a distributed application.

Which action will help resolve the errors?

A.

Rewrite the SQL query identified in the transaction to be more efficient

B.

Log in to the node directly and investigate the errors by reviewing log files

C.

Drill down to investigate and identify the errors

D.

Scale out the node horizontally

What is a benefit of Infrastructure as Code for the cloud?

A.

It groups system downtime across the infrastructure

B.

It enables the user to automate deployments

C.

It does not require configuration.

D.

It is a cost effective solution for services

Refer to the exhibit.

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Refer to the exhibit A DevOps engineer is responsible for monitoring a mission-critical app During normal operations, when opening the application dashboard, it has been noticed that Ecom-Tier1 suddenly turns partially red Which action must be taken to address the Ecom-Tier1 turning red?

A.

Restart the service to re-establish the connection with the nodes and clear the path.

B.

Decrease the load on the MySQL databases to release the hardware resources available for node distribution

C.

Check with the planning team to understand if the number of nodes in the Ecom tier can be increased to handle traffic

D.

Contact the network team to investigate the network path that caused this intermittent issue around 9.10.

Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or less.

Drag and drop the code snippets from the bottom onto the blanks in the code to monitor the site and network health on a Cisco DNA Center platform instance. Options may be used more than once. Not all options are used.

Which two actions help limit the attack surface of your Docker container? (Choose two.)

A.

Run only a single service in each container.

B.

Run all services in a single image.

C.

Use version tags for base images and dependencies.

D.

Use Kali Linux as a base image.

E.

Download images over HTTPS supporting sites.

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)

A.

node

B.

app

C.

agent

D.

tier

E.

event

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster.

What kind of high-availability configuration is the developer running?

A.

active

B.

passive

C.

active-passive

D.

active-active

Which Dockerfile yields the most predictable builds?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.

Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

A.

Store the access token with GitHub environment variables

B.

Store the access token with GitHub encrypted secrets

C.

Store the access token in an environment file in the repository

D.

Hard code the access token in the repository with Base64 encoding

What is an advantage of using configuration management tools to automate infrastructure services?

A.

eliminates the need to run integration tests within the CI/CD pipeline

B.

provides high native monitoring of services

C.

eliminates the need for CI/CD tools

D.

integrates with container orchestration

Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)

A.

Service instances must be isolated from one another.

B.

Service must be independently deployable and scalable.

C.

Service are written using the same languages, frameworks, and framework versions.

D.

Service must be dependent, deployable, and scalable.

E.

Service instances do not need to be isolated from one another.

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)

A.

performing code reviews

B.

requirement gathering

C.

change management process

D.

new code scanning

E.

rollback plans

A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience.

Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)

A.

application feature sprawl

B.

CPU peak usage

C.

CPU average usage

D.

microservices count

E.

CPU frequency

Page: 2 / 2
Total 114 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved