A team is developing an application for end users. The application will use microservices. For user access, dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verity that various user actions work as expected?
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
• the CI/CD pipeline to spin up test instances.
• instances must be used to validate changes.
• changes must be validated prior to a continuous deployment workflow, and
• then push the changes to production
How should the pipeline target the required environment?
Drag and drop the code snippets from the bottom onto the boxes in the code to complete the docker-compose y ml and the mdex.js files to enable network communication between the containers of a Redis instance and a Node js web application The application must be reachable on the host via port 4001 Not all options are used
Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/ CD pipeline?
How does eliminating hardcoded or default passwords help to secure an environment?
Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)
A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.
Which type of failure would prevent the engineer from seeing the problem using the captured metrics?
Which two actions help limit the attack surface of your Docker container? (Choose two.)
Which Docker command is used to start an interactive Bash shell in a running container named “test�
Fill in the blanks to complete the line of Python code that sends a message to a Webex Teams room or person.
What is an advantage of using configuration management tools to automate infrastructure services?
Refer to the exhibit.
A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.
Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.
An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.
Which command validates the success of the application deployment?
An application communicates with multiple third-party services that use API keys When stress testing the system, developers must change the URLs of the third-party services The application must run on port 5000. but the developers must be able to change the port at runtime if required Which configuration management approach simplifies the development workflow and reduces the configuration changes?
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
Refer to the exhibit.
A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?
Drag and drop the tools from the left onto the tool's function on the right. Not all options are used.
A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down.
Which deployment strategy must be used?
Fill in the blanks to complete the statement.
When creating multiple containers, in order to allow communication with each other, you must create a_____________ of type_____________.
Refer to the exhibit.
The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.
What causes the issue?
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
Refer to the exhibit.
What are the properties of the load balancer in a Kubernetes environment?
The IaC configuration for an application is being deployed using a CI/CD pipeline. Drag and drop the steps for this pipeline from the left into the correct order that they would be executed on the right. Not all options are used.
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?
A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)
Refer to the exhibit.
A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start.
Why did the pipeline fail to start?
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?