Exam 34: Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

A

  Refer to the exhibit. What is causing the requests code to fail? Refer to the exhibit. What is causing the requests code to fail?

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

B

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

A,C

What are two advantages of using Configuration Management Tools? (Choose two.)

(Multiple Choice)
5.0/5
(35)

How does eliminating hardcoded or default passwords help to secure an environment?

(Multiple Choice)
4.8/5
(35)

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels. Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

(Multiple Choice)
5.0/5
(40)

Which step must be taken to enable centralized logging in a Kubernetes environment?

(Multiple Choice)
4.8/5
(35)

Which Kubernetes object is used to create a ClusterIP or NodePort?

(Multiple Choice)
4.9/5
(29)

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

(Multiple Choice)
4.8/5
(32)

What is chaos engineering?

(Multiple Choice)
4.8/5
(34)

When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?

(Multiple Choice)
4.7/5
(42)

What is the effective way to manage computing costs in a public cloud?

(Multiple Choice)
4.7/5
(29)

The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays. Where in the interface does AppDynamics bring this to your attention?

(Multiple Choice)
4.8/5
(36)

Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/CD pipeline?

(Multiple Choice)
4.8/5
(31)

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

(Multiple Choice)
4.8/5
(40)

What is the purpose of using a build tool in software development?

(Multiple Choice)
5.0/5
(33)

A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?

(Multiple Choice)
4.9/5
(37)

Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)

(Multiple Choice)
4.8/5
(25)

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

(Multiple Choice)
5.0/5
(27)

Which two actions help limit the attack surface of your Docker container? (Choose two.)

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 33
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)