Free 300-910 Sample Questions — Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS)

Free 300-910 sample questions for the Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 300-910 practice test

Looking for more? Click here to get the full PDF with 74+ practice questions for $10 for offline study and deeper preparation.

Question 1

A new version of an application is being released by creating a separate instance of the application that is running the new code. Only a small portion of the user base will be directed to the new instance until that version has been proven stable. Which deployment strategy is this example of?

  • A. recreate
  • B. blue/green
  • C. rolling
  • D. canary
Show Answer
Correct Answer:
D. canary
Question 2

Which two elements help to secure your API keys? (Choose two.)

  • A. ramdomness
  • B. SHA1
  • C. triple AES
  • D. rotation
  • E. dictionary
Show Answer
Correct Answer:
  • A. ramdomness
  • D. rotation
Question 3

What is a benefit of monitoring the CI/CD pipeline?

  • A. troubleshoots distributed systems performance
  • B. proactively deploys new servers if needed
  • C. analyzes network outages that affect the network and server infrastructure
  • D. provides insight into how efficiently the development team is operating
Show Answer
Correct Answer:
D. provides insight into how efficiently the development team is operating
Question 4

A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed. Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?

  • A. Remove the failing test
  • B. Manually deploy the change into the production environment
  • C. Use a backup pipeline
  • D. Replicate the production environment in the pipeline before applying
Show Answer
Correct Answer:
D. Replicate the production environment in the pipeline before applying
Question 5

A team must roll out updates on the production instance of an application. To avoid any service down time, the new version must be released alongside the old version. After the team ensures that the new version operates as it should, traffic will be redirected to the new version. Then the old version will be shut down. Which deployment strategy must be used?

  • A. rolling
  • B. blue/green
  • C. shadow
  • D. canary
Show Answer
Correct Answer:
B. blue/green
Question 6

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible. Which approach accomplishes this goal?

  • A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications
  • B. Use the same passwords across the entire CI/CD pipeline
  • C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
  • D. Never use one-time passwords in CI/CD pipeline
Show Answer
Correct Answer:
C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
Question 7

A DevOps engineer must validate the working state of the network before implementing a CI/CD pipeline model. Which configuration management tool is designed to accomplish this?

  • A. Jenkins
  • B. Genie CLI
  • C. Travis CI
  • D. Python YAML data libraries
Show Answer
Correct Answer:
B. Genie CLI
Question 8

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver. In which file should the name of the middleware server be configured?

  • A. Docker Service discovery daemon
  • B. Docker Swarm
  • C. Docker Compose
  • D. Dynamic Host Configuration Protocol
Show Answer
Correct Answer:
C. Docker Compose
Question 9

What are two testing scenarios of the chaos engineering principle? (Choose two.)

  • A. maxing out CPU cores on an Elasticsearch duster
  • B. removing all users from a version control system
  • C. executing routine in driver code to emulate I/O errors
  • D. blocking developers’ building access
  • E. unplugging a core switch device
Show Answer
Correct Answer:
  • A. maxing out CPU cores on an Elasticsearch duster
  • C. executing routine in driver code to emulate I/O errors
Question 10

A team is developing an application for end users. The application will use microservices. For user access dual-factor authentication will be used. Which type of test must be performed by the CI/CD tool to replicate user behavior and to verify that various user actions work as expected?

  • A. unit
  • B. end-to-end
  • C. A/B
  • D. sanity
Show Answer
Correct Answer:
B. end-to-end
Question 11

A user wants to deploy a new service to a Kubernetes cluster. Which two commands accomplish this goal? (Choose two.)

  • A. Apply
  • B. Install
  • C. Deploy
  • D. Create
  • E. Expose
Show Answer
Correct Answer:
  • A. Apply
  • D. Create
Question 12

A development team uses Kubernetes for application development. Any changes on ConfigMap are performed manually for each development, test, and production environment. The edits are performed to deploy applications. This approach causes inconsistent deployments across all environments. Which practice improves the consistency of the deployments?

  • A. Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored
  • B. Generate the ConfigMaps specific to the environment by using a templating language such as Jinja2 and store the ConfigMaps in unique branches of a repository
  • C. In the master branch where the ConfigMaps are stored, create a branch for each environment that contains an environment-specific ConfigMap
  • D. Create a unique repository for each environment that contains ConfigMaps for that environment to ensure that each environment can be deployed independently
Show Answer
Correct Answer:
A. Implement environment variables within the ConfigMaps and store the variable definitions separately from the master branch where the ConfigMaps are stored
Question 13

What is the impact of using the Drone.io CI/CD tool on the local installation step?

  • A. slows down the development
  • B. delays the deployment of components
  • C. speeds up the procedure
  • D. complicates the application process
Show Answer
Correct Answer:
C. speeds up the procedure
Question 14

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of "Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment. Which Kubernetes command confirms that the service is running and usable?

  • A. kubectl -n Cisco get services | grep "Cisco-DB"
  • B. kubectl -n Cisco get pods | grep "Cisco-DB"
  • C. kubectl get pods | grep "Cisco-DB"
  • D. kubectl -n Cisco get service | grep "Cisco-DB"
Show Answer
Correct Answer:
B. kubectl -n Cisco get pods | grep "Cisco-DB"
Question 15

A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster. What kind of high-availability configuration is the developer running?

  • A. active
  • B. passive
  • C. active-passive
  • D. active-active
Show Answer
Correct Answer:
D. active-active

Aced these? Get the Full Exam

Download the complete 300-910 study bundle with 74+ questions in a single printable PDF.