A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.
Which command does the pipeline run to accomplish this goal?
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?
A)
B)
C)
D)
Fill in the blank to complete the statement.
A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.
Refer to the exhibit.
The push_configs.yml playbook returns the error shown.
Which action resolves the error?
What is a practice of infrastructure as code?
A developer must create a GitLab CI/CD pipeline with these requirements:
• builds an on-demand test environment
• deploys configurations
• verifies the results
Drag and drop the code from the bottom onto the box where the code is missing to complete the GitLab CI/CD pipeline. Not all options are used.
Which Kubernetes object ensures that each node is limited to running no more than one pod?
A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.
Which metric must be used to trigger autoscaling events?
Refer to the exhibit.
How does the architecture respond to a usage spike?
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service should be used to provide hosted continuous service for open and private projects?
An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
Refer to the exhibit.
Which CI solution uses this file?
A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?
Refer to the exhibit.
The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.
What causes the issue?
An engineer is developing a script that must call an API using a static Bearer token Which solution securely protects the credentials from being retrievable from the source code?
A)
A)
B)
C)
D)
What is a benefit of monitoring the CI/CD pipeline?
Refer to the exhibit.
A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?
An organization is developing an application using Git. Each team member is assigned to work on specific parts of the application. At the end of each task, individual code parts are merged in the main build.
Which two requirements should be implemented to increase the likelihood of continuous integration? (Choose two.)
Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.
Refer to the exhibit.
What is causing the requests code to fail?
A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.
Which type of failure would prevent the engineer from seeing the problem using the captured metrics?
Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.
When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
• the CI/CD pipeline to spin up test instances.
• instances must be used to validate changes.
• changes must be validated prior to a continuous deployment workflow, and
• then push the changes to production
How should the pipeline target the required environment?
Which two elements help to secure your API keys? (Choose two.)
An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.
Refer to the exhibit.
How should the Jenkins job be troubleshooted based on the error provided?
Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.
What are two advantages of using Configuration Management Tools? (Choose two.)
Refer to the exhibit.
The snippet contains the JSON string that will be sent to the Prometheus AlertManager to silence an alert. AlertManager accepts only the content type of application 'json'' Which Python code correctly sends an API call to perform action?
A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.
Which Kubernetes command confirms that the service is running and usable?
Refer to the exhibit. A containerized application that leverages a container host VM must be deployed. Drag and drop the events on the left onto their related steps on the right in order to describe the sequence behind the process.
An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.
Which action must be used to prevent developers from accidentally committing secrets in the code?
A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.
Which deployment strategy must be used?
An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?
Refer to the exhibit A DevOps engineer must deploy two microservices The deployment must be installed in a new Kubernetes cluster. The microservices currently run in Docker and are managed by using the provided docker-compose yml file Drag and drop the steps from the left into order on the right to successfully deploy the microservices
Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.