
Cisco Implementing DevOps Solutions and Practices using Cisco Platforms - 300-910 Exam Questions
QUESTION NO: 1
What are two benefits of Infrastructure as Code? (Choose two.)
What are two benefits of Infrastructure as Code? (Choose two.)
Correct Answer: D,E
QUESTION NO: 2
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
Correct Answer: D
Explanation: Only visible for Pass4Test members. You can sign-up / login (it's free).
QUESTION NO: 3
Refer to the Exhibit.

Refer to the Exhibit.

Correct Answer:

QUESTION NO: 4
-
A developer is creating an application where each service uses a different operating system. The application components need to be isolated but must have the ability to communicate with each other.
Drag and drop the entries from the left into the order on the right to create a Dockerfile that will accomplish this goal.

-
A developer is creating an application where each service uses a different operating system. The application components need to be isolated but must have the ability to communicate with each other.
Drag and drop the entries from the left into the order on the right to create a Dockerfile that will accomplish this goal.

Correct Answer:

QUESTION NO: 5
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?
Correct Answer: A
QUESTION NO: 6
Refer to the Exhibit.
Which Dockerfile yields the most predictable builds?
Refer to the Exhibit.
Which Dockerfile yields the most predictable builds?
Correct Answer: B
QUESTION NO: 7
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
Correct Answer: D
QUESTION NO: 8
Refer to the exhibit.

How does the architecture respond to a usage spike?
Refer to the exhibit.

How does the architecture respond to a usage spike?
Correct Answer: D
QUESTION NO: 9
Fill in the blanks to complete the statement.
When creating multiple containers, in order to allow communication with each other, you must create a_____________ of type _____________.
Fill in the blanks to complete the statement.
When creating multiple containers, in order to allow communication with each other, you must create a_____________ of type _____________.
Correct Answer: A
QUESTION NO: 10
A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?
A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?
Correct Answer: C
Explanation: Only visible for Pass4Test members. You can sign-up / login (it's free).