Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 300-910 Practice Exam with Questions & Answers | Set: 2

Questions 11

What is chaos engineering?

Options:
A.

designing an application with fuzzy logic that makes it hard to predict

B.

a product engineering approach that lacks a formal methodology

C.

splitting a project between teams that do not communicate with each other

D.

introducing problems into a system to study behavior and improve reliability

Cisco 300-910 Premium Access
Questions 12

What is the impact of using the Drone.io CI/CD tool on the local installation step?

Options:
A.

slows down the development

B.

delays the deployment of components

C.

speeds up the procedure

D.

complicates the application process

Questions 13

Drag and drop the steps in Garter’s public cloud management framework from the left into the order on the right.

300-910 Question 13

Options:
Questions 14

What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?

Options:
A.

cost

B.

metrics and monitoring

C.

hardware maintenance

D.

credentials management

Questions 15

An IT team at a SaaS company has this Cl/CD pipeline

  • Developers push code to the central repository by using Git.
  • The code is packaged and sent by an automated process to the staging environment where the tests are executed again automatically
  • If the automated tests pass in staging the code is pushed to production

Which change improves the Cl/CD pipeline?

Options:
A.

QA must also run the tests manually in the staging environment

B.

Operations must test in another environment before production

C.

Run unit tests before build and stage testing

D.

The developers run the unit tests manually instead of the QA team

Questions 16

Refer to the exhibit.

300-910 Question 16

A docker-compose.yml file implements a postgres database container.

Which .gitlab-ci.yml code block checks the health status of the container and stops the pipeline if the container is unhealthy?

A)

300-910 Question 16

B)

300-910 Question 16

C)

300-910 Question 16

D)

300-910 Question 16

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 17

An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the cause of this issue?

Options:
A.

Check to make sure Nginx is running.

B.

Check for response times in Nginx logs.

C.

Check to make sure the web API response is coming back in JSON.

D.

Check the size of the database that the application is using.

Questions 18

Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

Options:
A.

Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.

B.

Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.

C.

Use only software modules that are written by the internal team.

D.

Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.

E.

Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

Questions 19

A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.

Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

Options:
A.

Store the access token with GitHub environment variables

B.

Store the access token with GitHub encrypted secrets

C.

Store the access token in an environment file in the repository

D.

Hard code the access token in the repository with Base64 encoding

Questions 20

ConfigMap keys have been mapped to different file names using the volumes.configMap.items field. What is the result if a wrong ConfigMap key is specified?

Options:
A.

The default path is not used.

B.

The volume is not created.

C.

The volume is created.

D.

The volume is created with errors.

Exam Code: 300-910
Certification Provider: Cisco
Exam Name: Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)
Last Update: Jul 19, 2025
Questions: 114