لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster. What kind of high-availability configuration is the developer running?
A. active
B. passive
C. active-passive
D. active-active
عرض الإجابة
اجابة صحيحة: S
السؤال #2
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)
A. performing code reviews
B. requirement gathering
C. change management process
D. new code scanning
E. rollback plans
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What is the user doing with Drone in this automated test?
A. testing Alpine Linux versus Ubuntu Linux
B. testing a PostgreSQL DB against multiple architectures
C. testing only the amd64 architecture
D. testing PostgreSQL deployment in an Alpine Linux VM
عرض الإجابة
اجابة صحيحة: BC
السؤال #4
A DevOps engineer has built a new container and must open port 8080 for intercontainer communication. Which command must be added in a Dockerfile to accomplish this goal?
A. EXPOSE 8080
B. FIREWALL ADD-PORT 8080
C. PORT 8080
D. OPEN PORT 8080
عرض الإجابة
اجابة صحيحة: S
السؤال #5
A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)
A. Apply
B. Install
C. Deploy
D. Create
E. Expose
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?
A. ReplicaSet
B. PriorityClass
C. Deployment
D. Pod
عرض الإجابة
اجابة صحيحة: CE
السؤال #7
Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/CD pipeline?
A. AMQP
B. SNMP
C. SSH
D. REST
عرض الإجابة
اجابة صحيحة: BD
السؤال #8
ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?
A. The default path is not used
B. The volume is not created
C. The volume is created
D. The volume is created with errors
عرض الإجابة
اجابة صحيحة: C
السؤال #9
The exhibit shows the output of an Ansible task that prints the contents of the show_ip_int_brief variable that was registered in a different task in the playbook. Which expression is used to print the output of the command without its header row?
A. show_ip_int_brief[‘stdout_lines’][0]
B. show_ip_int_brief[‘stdout_lines’][1:]
C. show_ip_int_brief[‘stdout_lines’][0][1:]
D. show_ip_int_brief[‘stdout_lines’]
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)
A. It runs unit tests against code that is committed
B. It builds your software on the production environment
C. It builds your software when changes are committed
D. It builds your software every 500 milliseconds
E. It must have a plug-in for Puppet and Maven
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?
A. Add a step to run the debug ip routing command before the change, and add a step after the change to issue the no debug ip routing command
B. Add a step to capture the routing table before the change, and add a step after the change to capture it again
C. Add a step to ping a host on each of the static routes before the change, and a step after to repeat the same check
D. Add a step to run the same playbook again with the debug option enabled and use grep on the log output to ensure that the commands are not applied again
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An interface on a router as a Layer 3 link has been configured to another device by updating an Ansible playbook that is executed via a CI/CD pipeline. The Ansible playbook was written to push the configuration change using the ios_config module. Which automated test validates that the interface is functioning as it should?
A. Add a pipeline step that runs the playbook a second type
B. Automated testing is already built in because the playbook execution is successful only after Ansible validates that it applied the change
C. Add a pipeline step that captures and parses the packet flow for the interface
D. Add a pipeline step that captures and parses the show ip interface output so that the operational state can be referenced
عرض الإجابة
اجابة صحيحة: BC
السؤال #13
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
A. encode the value with base64 in a secure DNS CTEXT entry
B. as an environment variable in the Dockerfile
C. Docker environment variable
D. Docker secrets
عرض الإجابة
اجابة صحيحة: AE
السؤال #14
A DevOps engineer has built a container to host a web-server and it must run as an executable. Which command must be configured in a Dockerfile to accomplish this goal?
A. ENTRYPOINT
B. ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]
C. ENTRYPOINT [“BACKGROUND”, “-D”, “/usr/sbin/apache2ctl”]
D. ENTRYPOINT {usr/sbin/apache2ctl}
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Microservices architecture pattern has been applied and the system has been architected as a set of services. Each service is deployed as a set of instances for throughput and availability. In which two ways are these services packaged and deployed? (Choose two.)
A. Service instances must be isolated from one another
B. Service must be independently deployable and scalable
C. Service are written using the same languages, frameworks, and framework versions
D. Service must be dependent, deployable, and scalable
E. Service instances do not need to be isolated from one another
عرض الإجابة
اجابة صحيحة: CE
السؤال #16
What is causing the requests code to fail?
A. Rython3 is not compatible with requests
B. The requests library is not imported
C. The requests library is not installed
D. The requests coming into stdin fail because device_ip cannot be parsed
عرض الإجابة
اجابة صحيحة: D
السؤال #17
What is chaos engineering?
A. designing an application with fuzzy logic that makes it hard to predict
B. a product engineering approach that lacks a formal methodology
C. splitting a project between teams that do not communicate with each other
D. introducing problems into a system to study behavior and improve reliability
عرض الإجابة
اجابة صحيحة: B
السؤال #18
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
A. node
B. app
C. agentD
E. event
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)
A. mean time between success
B. mean time to recover
C. cone testing
D. change lead time
E. age of codebase
عرض الإجابة
اجابة صحيحة: D
السؤال #20
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
A. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack
B. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms
C. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis
D. A single, comprehensive log format is defined on the ELK Stack
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?
A. Dynamic Application Security Testing
B. Runtime Application Health-Protection
C. Continuous Application Security Testing
D. Static Analysis Security Testing
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience. Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)
A. application feature sprawl
B. CPU peak usage
C. CPU average usage
D. microservices count
E. CPU frequency
عرض الإجابة
اجابة صحيحة: A
السؤال #23
An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?
A. Check to make sure Nginx is running
B. Check for response times in Nginx logs
C. Check to make sure the web API response is coming back in JSON
D. Check the size of the database that the application is using
عرض الإجابة
اجابة صحيحة: B
السؤال #24
What is the reason for this error message?
A. The required dependencies for the urllib3 module are not installed
B. The requests module is not installed
C. The required dependencies for the requests module are not installed
D. The site-packages directory has been corrupted
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: