Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CloudBees > Jenkins Engineer > CJE

CJE Certified Jenkins Engineer (CJE) Question and Answers

Question # 4

Which answer best describes continuous deployment?

A.

Building in 60 minutes or less.

B.

A software development discipline where software is built so that it can be released to production at any time.

C.

A software development practice where contributors are integrating their work very frequently.

D.

A software development discipline where software is released continuously as part of an automated pipeline.

Full Access
Question # 5

In a JUnit report, if we set the "Health report amplification factor" to 3 and there's a 10% failure, what's the health score?

A.

98%

B.

70%

C.

75%

D.

60%

Full Access
Question # 6

How do you setup the GitHub Plugin Git hook from a Project Configuration Perspective?

A.

Set the "Build Periodically" trigger, but you don't have to specify an interval

B.

None of these

C.

Set the "GitHub hook trigger for GITScm polling" trigger

D.

Set the "Poll scm" trigger, but you don't have to specify an interval

Full Access
Question # 7

What's an example of a cloud-based SCM?

A.

GitHub

B.

Atlassian BitBucket

C.

All of these

D.

AWS CodeCommit

Full Access
Question # 8

What are the main advantages of using webhooks/post commit hooks from your Source Code Management system to trigger your Jenkins project rather than using SCM polling? Choose 2 answers A A. Builds are started on a defined a on schedule.

B. Avoid unnecessary overhead from polling.

C. Builds are started immediately after changes are committed.

D. The entire repository Is scanned so no commits are missed.

Full Access
Question # 9

How do you configure notifications in a Jenkinsfile?

A.

emailext

B.

notice

C.

email

D.

alert

Full Access
Question # 10

What's the difference between authentication and authorization?

A.

None of these

B.

Authorization is more strict

C.

Authorization identifies a user, while authentication dictates what a user is allowed to do.

D.

Authentication identifies a user, while authorization dictates what a user is allowed to do.

Full Access
Question # 11

During a proposal, you need to quickly retrieve configuration for a demo of a project named “My Freestyle Project”, which is in the "Freestyles" folder, in a neat and easily-readable XML format using a REST API call. What is the correct syntax for the call?

Full Access
Question # 12

How would you invoke a Docker agent?

A.

agent { label 'docker'}

B.

None of these

C.

agent { docker 'openjdk'}

D.

agent docker

Full Access
Question # 13

You're setting up a folder config in Jenkins, and you set a couple of items called "child item with worst health" and "recursive." A colleague turns to you, since you know the answers to the rest of his questions, and asks you, "how do I determine the health of the folder with those items set?What's your answer?

A.

Only top scoped projects will determine the health of a folder.

B.

I don't know. Ask someone else.

C.

Items in nested sub-folders are used to calculate the folders health.

D.

Don't be silly. Folder's don't have health.

Full Access
Question # 14

You've been promoted at work and are now in charge of the system administrators that look after the Jenkins platform for your company. You no longer want to get notifications from Jenkins, but your subordinates don't know what settings to change in a Jenkinsfile. You give them a look, and say one of the following is what needs to be changed:

A.

notice

B.

alert

C.

email

D.

emailext

Full Access
Question # 15

On a single Jenkins master you have a folder named "Project1 ". I his folder contains three jobs: "job master", "job develop", and "Job edge". The job "job master" Is the latest built project and Is In a success state while the two other jobs are in falling state. Which statement is true about the folder "Project1"?

A.

It reports its health as "failed" {"Raining Cloud" weather icon), because that is the "worst health of the sub-items".

B.

It reports its health as "success" ("Sunny" weather icon), because that is the health of the "latest built item."

C.

It must be configured with a dedicated "Health Metric" setting before it can report its health with weather icons.

D.

It does not report its health on the folder level; only Jobs report health.

Full Access
Question # 16

A Freestyle job has the configuration shown here:

You run the following command from a Unix terminal: curl http: ///git/notifyCommit?

url-gitagithub.com: cloudbees/github test.git Will the Job be triggered?

A.

It will not be triggered.

B.

It will be triggered if the polling detects a change In any git branch.

C.

It will be triggered if the polling detects a change In the git branch "master".

D.

It will be triggered if the polling detects a change in the git branch "development".

Full Access
Question # 17

You want to deploy a Jenkins pipeline, but you are concerned about the total amount of time it will take for the deployment to complete, and you aren't concerned with files left in the working directory after a build. What should you do?

A.

Tune the "timer" section for the project.

B.

Choose not to use a clean checkout.

C.

There's no way to reduce the time

D.

Use a clean checkout.

Full Access
Question # 18

Which are Source Code Management tools?

Choose 3 answers

A.

Java

B.

Perforce

C.

Subversion

D.

Git

E.

Maven

Full Access
Question # 19

You are the administrator of a base Jenkins master with the recommended set of plugins installed. You want to protect the Jenkins master against malicious (or bad) usages of Groovy methods. You also want your users to be able to share their Pipeline code via Global Pipeline Libraries housed on a git repository under your company's Github Organization. Which of the following statements is TRUE?

A.

You should configure Global Pipeline Libraries at the Github Organization level: The libraries are running as "untrusted" code, allowing developers to run code on the Groovy sandbox.

B.

You should configufe Global Pipeline Libraries at the Pipeline level: The libraries are running as "untrusted" code, allowing developers to run code on the Groovy sandbox.

C.

You should not configure any Global Pipeline Libraries at all: The libraries are running as "trusted" code, allowing all developers to execute privileged methods.

D.

You should not configure any Global Pipeline Libraries at the folder level: The libraries are running as "trusted" code, allowing all developers to execute privileged methods.

Full Access
Question # 20

Yon are an administrator of a base Jenkins master with the recommended plugin set and you want to connect a new agent using SSH. Authentication on the remote node that will host the agent is done with an SSH key pair which your users must NOT be able to see or access. Which of the following is TRUE assuming your users do not have admin rights?

A.

Use a credential "SSH Username with private key", restricted to the Scope "System", for the node's SSH authentication.

B.

You cannot use an SSH key-pair. Configure a password for the agent's SSH user, and create a credential of type "Username with password" for the node's SSH authentication.

C.

Use a credential "SSH Username with private key", restricted to the Scope "Agents", for the node's SSH authentication.

D.

The SSH key will be stored in the JENKINS_HOME/.ssh folder. Configure the agent to use a key from the "standard" SSH folder.

Full Access
Question # 21

What's an example of SCM software?

A.

Jenkins

B.

Subversion

C.

Git

D.

Both Git and Subversion

Full Access
Question # 22

What is the purpose of the "Manage Old Data" screen under "Manage Jenkins"?

A.

Delete artifacts, togs, and backups that are no longer required.

B.

Clean up workspaces left by deleted Jenkins users.

C.

Delete outdated configurations left by uninstalled, deleted, or upgraded plugins.

D.

Delete or restore old credentials details.

E.

Prepare for migration from Jenkins 1 to Jenkins 2.

Full Access
Question # 23

When would you use distributed builds?

A.

When you want to preserve resources on the master node

B.

When you want to simplify your architecture

C.

When you have few jobs and plenty of resources on your master

D.

When security isn't a concern

Full Access
Question # 24

You can set project-based security for users.

A.

False

B.

True

Full Access
Question # 25

What type of file extension do plugin files have?

A.

.rb

B.

.hpi

C.

.groovy

D.

.java

Full Access
Question # 26

Which of the following "agent" directives are not valid in Declarative Pipeline?

A.

agent (dockerfile {filename ' Dockerfile' } }

B.

agent { label 'Minux' }

C.

agent docker

D.

agent { docker ' centos:latest' }

E.

agent none

Full Access