FILL BLANK Fill in the blanks to describe the concepts of extending DevOps practices to the network for NetDevOps. NetDevOps builds and manages networks as a system that enables network services to be consumed in a DevOps approach. Organizations practicing NetDevOps see changes in the _________ as routine and expected activities, with a well-
defined and practiced process for _________ , testing, and __________ network changes. By making them routine, network changes can be small and simple.
A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?
A. ENTRYPOINT
B. ENTRYPOINT ["/usr/sbin/apache2ctl", "-D", "FOREGROUND"]
C. ENTRYPOINT ["BACKGROUND", "-D", "/usr/sbin/apache2ctl"]
D. ENTRYPOINT {usr/sbin/apache2ctl}
What are two benefits of Infrastructure as Code? (Choose two.)
A. It enables continuous integration.
B. It allows for management control.
C. It ensures consistency.
D. It improves application monitoring.
E. It reduces risk.
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
A. node
B. app
C. agent
D. tier
E. event
The E-commerce application is being monitored using AppDynamics. AppDynamics has noticed that the application response has degraded and has identified some thread contention that might be the cause of the delays. Where in the interface does AppDynamics bring this to your attention?
A. Potential Issues section of an individual transaction
B. Transaction Score graph of a business transaction
C. Code Deadlock section of the Event List
D. Slow Calls and Errors tab of the application
What is chaos engineering?
A. designing an application with fuzzy logic that makes it hard to predict
B. a product engineering approach that lacks a formal methodology
C. splitting a project between teams that do not communicate with each other
D. introducing problems into a system to study behavior and improve reliability
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
A. encode the value with base64 in a secure DNS CTEXT entry
B. as an environment variable in the Dockerfile
C. Docker environment variable
D. Docker secrets
How does eliminating hardcoded or default passwords help to secure an environment?
A. helps by enforcing your password in a repository and storing it in a secure vault
B. helps to manage passwords centrally
C. helps penetration testing team to focus on other issues more efficiently
D. helps by removing back doors in your environments
Refer to the exhibit.
The push_configs.yml playbook returns the error shown.
Which action resolves the error?
A. Install the Paramiko library on the host that runs Ansible
B. Generate a new SSH key pair and add the public key to the target machine
C. Export the ANSIBLE_HOST_KEY_CHECKING=False variable
D. Comment out the StrictHostKeyChecking=yes line from ansible.cfg
Refer to the exhibit.
What are the properties of the load balancer in a Kubernetes environment?
A. Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1
B. Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port
C. Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp
D. Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp
An IT department needs to deploy a new application named `Entfin434772390' across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named `Entfin02754932l'. Both versions of the application are running in the production environment.
Which release strategy should be used by the IT department?
A. agile
B. canary
C. rollbacks
D. blue/green
A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments.
Which practice improves the consistency of the deployments?
A. Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored
B. Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository
C. In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap.
D. Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
1.
the CI/CD pipeline to spin up test instances.
2.
instances must be used to validate changes.
3.
changes must be validated prior to a continuous deployment workflow, and
4.
then push the changes to production
How should the pipeline target the required environment?
A. Use separate CI servers for each environment
B. Use different pipelines for each environment
C. Use separate Git repositories for each environment
D. Use different inventory files for each environment
An application for storing and categorizing has been developed. The application uses dual- factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
A. Use self-developed algorithms for encryption
B. Install virtual firewalls
C. Actively change the ISP provider
D. Apply all the latest patches and updates
What is the impact of using the Drone.io CI/CD tool on the local installation step?
A. slows down the development
B. delays the deployment of components
C. speeds up the procedure
D. complicates the application process