Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibit.

What are the properties of the load balancer in a Kubernetes environment?

A.

Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

B.

Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

C.

Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

D.

Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp

Full Access
Question # 5

A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster.

What kind of high-availability configuration is the developer running?

A.

active

B.

passive

C.

active-passive

D.

active-active

Full Access
Question # 6

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

A.

Jenkins

B.

Genie CLI

C.

Travis CI

D.

Python YAML data libraries

Full Access
Question # 7

An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application.

Which command validates the success of the application deployment?

A.

kubectl get pods -o wide -w

B.

kubectl rollout status deployment

C.

kubectl describe pods/

D.

kubectl rollout history deployment

Full Access
Question # 8

Which Docker command is used to start an interactive Bash shell in a running container named “test”?

A.

docker attach -it test /bin/bash

B.

docker run -it test /bin/bash

C.

docker exec -it test /bin/bash

D.

docker run test /bin/bash

Full Access
Question # 9

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

A.

The default path is not used.

B.

The volume is not created.

C.

The volume is created.

D.

The volume is created with errors.

Full Access
Question # 10

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Full Access
Question # 11

Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

Refer to the exhibit.

The exhibit shows the output of an Ansible task that prints the contents of the

show_ip_int_brief variable that was registered in a different task in the playbook.

Which expression is used to print the output of the command without its header row?

A.

show_ip_int_brief[‘stdout_lines’][0]

B.

show_ip_int_brief[‘stdout_lines’][1:]

C.

show_ip_int_brief[‘stdout_lines’][0][1:]

D.

show_ip_int_brief[‘stdout_lines’]

Full Access
Question # 13

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Full Access
Question # 14

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

Full Access
Question # 15

What is the effective way to manage computing costs in a public cloud?

A.

Monitor data transfers to minimize cost.

B.

Use dedicated hardware for all instances.

C.

Select the largest instance option available in order to pay for only one instance.

D.

Make use of elastic services and scale on demand.

Full Access
Question # 16

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups.

Which action must be used to prevent developers from accidentally committing secrets in the code?

A.

Add a unit test to block the secrets

B.

Add a precommit Git hook to block the secrets

C.

Add dast to the repository to block the secrets

D.

Add a job in the CI build to block the secrets

Full Access
Question # 17

A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined infrastructure.

Which command does the pipeline run to accomplish this goal?

A.

terraform plan

B.

terraform check

C.

terraform fmt

D.

terraform validate

Full Access