A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?
A. Jenkins
B. Genie CLI
C. Travis CI
D. Python YAML data libraries
A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?
A. ENTRYPOINT
B. ENTRYPOINT ["/usr/sbin/apache2ctl", "-D", "FOREGROUND"]
C. ENTRYPOINT ["BACKGROUND", "-D", "/usr/sbin/apache2ctl"]
D. ENTRYPOINT {usr/sbin/apache2ctl}
What is the purpose of using a build tool in software development?
A. It complies source code into binaries and executables.
B. It provides a way to edit source code using a graphical interface.
C. It is a manual process that is followed to build software.
D. It tracks bugs and incidents in a built application.
What are two benefits of Infrastructure as Code? (Choose two.)
A. It enables continuous integration.
B. It allows for management control.
C. It ensures consistency.
D. It improves application monitoring.
E. It reduces risk.
Refer to the exhibit.
A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?
A. ReplicaSet
B. PriorityClass
C. Deployment
D. Pod
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
A. node
B. app
C. agent
D. tier
E. event
How does eliminating hardcoded or default passwords help to secure an environment?
A. helps by enforcing your password in a repository and storing it in a secure vault
B. helps to manage passwords centrally
C. helps penetration testing team to focus on other issues more efficiently
D. helps by removing back doors in your environments
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?
A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications
B. Use the same passwords across the entire CI/CD pipeline
C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
D. Never use one-time passwords in CI/CD pipeline
Refer to the exhibit.
Which action allows the development team to reach the deployed application?
A. Create an init container to initialize routes for the containers in the pod
B. Create a service to expose the logic running in the pod
C. Delete the deployment and redeploy by using a ReplicaSet.
D. Delete the deployment and redeploy by using the latest tag for the container image
An IT team plans to deploy a new service built on top of an existing service. The capacity needed for the new service is difficult to estimate because the demand for the new service is undetermined. The team has these deployment requirements:
1.
A subset of the users of the original service must be migrated to the new service based on their profile
2.
The new service must be rolled back easily if capacity exceeds estimates
Which deployment strategy must be used?
A. rolling
B. blue/green
C. geolocation
D. canary