Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-910 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-910 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 114
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-910 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-910 Practice Exam Questions with Answers Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Certification

Question # 6

How does eliminating hardcoded or default passwords help to secure an environment?

A.

helps by enforcing your password in a repository and storing it in a secure vault

B.

helps to manage passwords centrally

C.

helps penetration testing team to focus on other issues more efficiently

D.

helps by removing back doors in your environments

Full Access
Question # 7

Refer to the exhibit.

300-910 question answer

A Python script implements a logger server. The log receives a message from Base that contains this text: TextMessage. How is the log formatted?

A.

Base Alter: TextMessage

B.

Undefined: TextMessageBase

C.

TextMessage -> Base

D.

TextMessage -> Alter Base

Full Access
Question # 8

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A.

Dynamic Application Security Testing

B.

Runtime Application Health-Protection

C.

Continuous Application Security Testing

D.

Static Analysis Security Testing

Full Access
Question # 9

What is chaos engineering?

A.

designing an application with fuzzy logic that makes it hard to predict

B.

a product engineering approach that lacks a formal methodology

C.

splitting a project between teams that do not communicate with each other

D.

introducing problems into a system to study behavior and improve reliability

Full Access
Question # 10

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:

• the CI/CD pipeline to spin up test instances.

• instances must be used to validate changes.

• changes must be validated prior to a continuous deployment workflow, and

• then push the changes to production

How should the pipeline target the required environment?

A.

Use separate CI servers for each environment

B.

Use different pipelines for each environment

C.

Use separate Git repositories for each environment

D.

Use different inventory files for each environment

Full Access
Question # 11

Refer to the exhibit.

300-910 question answer

What is causing the requests code to fail?

A.

Rython3 is not compatible with requests.

B.

The requests library is not imported.

C.

The requests library is not installed.

D.

The requests coming into stdin fail because device_ip cannot be parsed.

Full Access
Question # 12

A DevOps engineer is supporting a containerized application with multiple components running across the Kubernetes cluster. Metrics from the container (CPU and memory) and application (requests per second and heap size) are being collected by Prometheus and displayed with Grafana. Users report transaction timeout problems with the application, but the metric graphs all look within normal levels.

Which type of failure would prevent the engineer from seeing the problem using the captured metrics?

A.

Grafana has lost connectivity to Prometheus, which causes graphs to display only the cached data.

B.

CPU and memory metrics from Kubernetes nodes are not accurate due to the way that containers share resources.

C.

Some containers are crashing regularly and being restarted automatically by Kubernetes.

D.

The metricbeat agent has crashed and is no longer sending new data to Prometheus, so the metrics are not updating.

Full Access
Question # 13

What is the purpose of using a build tool in software development?

A.

It complies source code into binaries and executables.

B.

It provides a way to edit source code using a graphical interface.

C.

It is a manual process that is followed to build software.

D.

It tracks bugs and incidents in a built application.

Full Access
Question # 14

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of “Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.

Which Kubernetes command confirms that the service is running and usable?

A.

kubectl -n Cisco get services | grep “Cisco-DB”

B.

kubectl -n Cisco get pods | grep “Cisco-DB”

C.

kubectl get pods | grep “Cisco-DB”

D.

kubectl -n Cisco get service | grep “Cisco-DB”

Full Access
Question # 15

As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?

A.

Leverage machine learning tools to more quickly identify problems m syslog and SNMP data

B.

Update tools to pull or stream monitoring metrics from APIs instead of using legacy protocols

C.

Identify and capture the key performance indicators that describe the state of the network

D.

Identify and fix network issues faster by leveraging streaming telemetry from network devices

Full Access
Question # 16

To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?

A.

Configure a new JSON object in Kibana.

B.

Create a search index in Logstash.

C.

Create an index pattern in Kibana.

D.

Create a time filter on Kibana to look at time only.

Full Access
Question # 17

What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?

A.

prepares a new host to accept a hard drive image built on another machine

B.

removes all host-specific information and components from the local machine

C.

installs all the latest security patches and OS updates to the local machine

D.

writes the local hard drive image to an ISO file that can be deployed to another machine

Full Access
Question # 18

300-910 question answer

Drag and drop the steps in Gartner's public cloud cost management framework from the left into the order on the right.

Full Access
Question # 19

Fill in the blank to complete the statement.

A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.

Full Access
Question # 20

Refer to the exhibit.

300-910 question answer

An organization has issues with code-based failures after implementing a CI/CD pipeline to automate the builds and deployment phases of an application.

Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a successful continuous deployment?

A.

Restructuring and monitoring tests must be run after it is promoted to production

B.

Restructuring and monitoring tests must be run before it is promoted to production

C.

Functional and nonfunctional tests must be run after it is promoted to production

D.

Functional and nonfunctional tests must be run before it is promoted to production

Full Access
Question # 21

300-910 question answer

300-910 question answer

Refer to the exhibit A DevOps engineer is responsible for monitoring a mission-critical app During normal operations, when opening the application dashboard, it has been noticed that Ecom-Tier1 suddenly turns partially red Which action must be taken to address the Ecom-Tier1 turning red?

A.

Restart the service to re-establish the connection with the nodes and clear the path.

B.

Decrease the load on the MySQL databases to release the hardware resources available for node distribution

C.

Check with the planning team to understand if the number of nodes in the Ecom tier can be increased to handle traffic

D.

Contact the network team to investigate the network path that caused this intermittent issue around 9.10.

Full Access
Question # 22

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?

A.

soak testing

B.

unit testing

C.

load testing

D.

volume testing

Full Access
Question # 23

What is a practice of infrastructure as code?

A.

Use multiple version control systems

B.

Document as much as possible

C.

Configure the deployment consistently

D.

Test, integrate, and deploy once a day

Full Access
Question # 24

300-910 question answer

Refer to the exhibit. A containerized application that leverages a container host VM must be deployed. Drag and drop the events on the left onto their related steps on the right in order to describe the sequence behind the process.

300-910 question answer

Full Access
Question # 25

Which two statements about Infrastructure as Code are true? (Choose two.)

A.

Test-driven development practices make use of Infrastructure as Code.

B.

Infrastructure as Code refers to automated testing libraries.

C.

DevOps builds upon Infrastructure as Code.

D.

Infrastructure as Code is based on practices from software development.

E.

Infrastructure as Code must use the same programming language as the application.

Full Access
Question # 26

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct functions on the right.

300-910 question answer

Full Access
Question # 27

An interface on a router as a Layer 3 link has been configured to another device by updating an Ansible playbook that is executed via a CI/CD pipeline. The Ansible playbook was written to push the configuration change using the ios_config module. Which automated test validates that the interface is functioning as it should?

A.

Add a pipeline step that runs the playbook a second type. If it does not modify the device on the second run, then the interface is correctly configured.

B.

Automated testing is already built in because the playbook execution is successful only after Ansible validates that it applied the change.

C.

Add a pipeline step that captures and parses the packet flow for the interface.

D.

Add a pipeline step that captures and parses the show ip interface output so that the operational state can be referenced.

Full Access
Question # 28

When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)

A.

mean time between success

B.

mean time to recover

C.

cone testing

D.

change lead time

E.

age of codebase

Full Access
Question # 29

Drag and drop the commands from the bottom onto the correct Terraform code in the exhibit to push a network object to a Cisco ASA Firewall device.

300-910 question answer

Full Access
Question # 30

A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?

A.

EXPOSE 8080

B.

FIREWALL ADD-PORT 8080

C.

PORT 8080

D.

OPEN PORT 8080

Full Access
Question # 31

Refer to the exhibit.

300-910 question answer

Which CI solution uses this file?

A.

Drone

B.

GitLab CI

C.

Travis CI

D.

Jentans

Full Access
Question # 32

A development team is using Cl/CD during application development During the latest releases runtime vulnerabilities have been indicated to address these vulnerabilities. a complete redesign oí the affected applications were required To overcome this issue black box testing has been proposed. What must be used to automate this testing within a Cl/CD pipeline.

A.

source code analysis tools

B.

dynamic applications security testing

C.

Threat modeling

D.

vulnerability management

Full Access
Question # 33

Refer to the exhibit.

300-910 question answer

Which action allows the development team to reach the deployed application?

A.

Create an init container to initialize routes for the containers in the pod

B.

Create a service to expose the logic running in the pod

C.

Delete the deployment and redeploy by using a ReplicaSet.

D.

Delete the deployment and redeploy by using the latest tag for the container image

Full Access
Question # 34

A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time.

Which metric must be used to trigger autoscaling events?

A.

network

B.

CPU/GPU

C.

disk I/O

D.

memory

Full Access
Question # 35

What is a capability of node-level logging in Kubernetes?

A.

Using the Kubernetes JSON logging driver enables log persistence

B.

Output that is written to stdin is retrieved by using kubectl

C.

Output that is written to stderr is not logged or retrievable by using kubectl

D.

Using the local logging driver of Docker enables log persistence

Full Access
Question # 36

What are two testing scenarios of the chaos engineering principle? (Choose two.)

A.

maxing out CPU cores on an Elasticsearch cluster

B.

removing all users from a version control system

C.

executing routine in driver code to emulate I/O errors

D.

blocking developers’ building access

E.

unplugging a core switch device

Full Access
Question # 37

Refer to the exhibit.

300-910 question answer

What is the user doing with Drone in this automated test?

A.

testing Alpine Linux versus Ubuntu Linux

B.

testing a PostgreSQL DB against multiple architectures

C.

testing only the amd64 architecture

D.

testing PostgreSQL deployment in an Alpine Linux VM

Full Access
Question # 38

Refer to the exhibit.

300-910 question answer

The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.

What causes the issue?

A.

A hostgroup must be defined

B.

The “_type” must represent the process type

C.

The priority of the message must be to the server

D.

The process name in the message must be parsed into a field

Full Access
Question # 39

Refer to the exhibit.

300-910 question answer

The text represents a syslog message sent from a Linux server to a centralized log system.

Based on the format of the log message, how must the functionality of the log parser be extended to improve search capabilities?

A.

Reverse lookup the IP address to add a hostname field

B.

Convert the date to the time zone of the system

C.

Configure the Linux machine to add a UID field to messages

D.

Filter out the text of the message to speed up searches

Full Access