cisco 300-910 practice test

Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)


Question 1 Topic 6

Topic 6
Which two elements help to secure your API keys? (Choose two.)

  • A. ramdomness
  • B. SHA1
  • C. triple AES
  • D. rotation
  • E. dictionary
Answer:

A C

Discussions
0 / 600

Question 2 Topic 6

Topic 6
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to
continue using a secure software development lifecycle methodology and must plan for postproduction components. Which
two areas should be the developer address? (Choose two.)

  • A. performing code reviews
  • B. requirement gathering
  • C. change management process
  • D. new code scanning
  • E. rollback plans
Answer:

A C

Discussions
0 / 600

Question 3 Topic 6

Topic 6
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?

  • A. cost
  • B. metrics and monitoring
  • C. hardware maintenance
  • D. credentials management
Answer:

D

Discussions
0 / 600

Question 4 Topic 6

Topic 6
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker
container?

  • A. encode the value with base64 in a secure DNS CTEXT entry
  • B. as an environment variable in the Dockerfile
  • C. Docker environment variable
  • D. Docker secrets
Answer:

D

Discussions
0 / 600

Question 5 Topic 6

Topic 6
Which two elements help to secure your API keys? (Choose two.)

  • A. ramdomness
  • B. SHA1
  • C. triple AES
  • D. rotation
  • E. dictionary
Answer:

A C

Discussions
0 / 600

Question 6 Topic 6

Topic 6
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without
compiling the code into a running executable?

  • A. Dynamic Application Security Testing
  • B. Runtime Application Health-Protection
  • C. Continuous Application Security Testing
  • D. Static Analysis Security Testing
Answer:

D

Discussions
0 / 600

Question 7 Topic 6

Topic 6
How does eliminating hardcoded or default passwords help to secure an environment?

  • A. helps by enforcing your password in a repository and storing it in a secure vault
  • B. helps to manage passwords centrally
  • C. helps penetration testing team to focus on other issues more efficiently
  • D. helps by removing back doors in your environments
Answer:

A

Discussions
0 / 600

Question 8 Topic 5

Topic 5
What is chaos engineering?
A. designing an application with fuzzy logic that makes it hard to predict
B. a product engineering approach that lacks a formal methodology
C. splitting a project between teams that do not communicate with each other
D. introducing problems into a system to study behavior and improve reliability

Answer:

D
Topic 6, Security

Discussions
0 / 600

Question 9 Topic 5

Topic 5
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from
different devices in various formats?

  • A. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.
  • B. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.
  • C. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.
  • D. A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.
Answer:

D

Discussions
0 / 600

Question 10 Topic 5

Topic 5
Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/CD pipeline?

  • A. AMQP
  • B. SNMP
  • C. SSH
  • D. REST
Answer:

C

Discussions
0 / 600
To page 2