A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.
In which file should the name of the middleware server be configured?
Answer : A
Which Kubernetes object ensures that each node is limited to running no more than one pod?
Answer : C
Refer to the exhibit. What are the properties of the load balancer in a Kubernetes environment?
Answer : B
Refer to the exhibit. The JSON object represents a single entry on a centralized log server, but log data cannot be processed because of the format.
What causes the issue?
Answer : D
Refer to the exhibit. The push_configs.yml playbook returns the error shown.
Which action resolves the error?
Answer : C
What are two testing scenarios of the chaos engineering principle? (Choose two.)
Answer : AE
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.
If an attacker gains access to the scripts, what is the risk exposure?
Answer : D
DRAG DROP
-
A developer must create a GitLab CI/CD pipeline with these requirements:
• builds an on-demand test environment
• deploys configurations
• verifies the results
Drag and drop the code from the bottom onto the box where the code is missing to complete the GitLab CI/CD pipeline. Not all options are used.
Answer :
A company has a CI/CD pipeline implemented to automate application deployment. An urgent change is required in the production environment. A developer produces and tests the required change in the company's environment, but the pipeline fails when pushed.
Which action conforms to the rules of a CI/CD pipeline and enables the pipeline to pass?
Answer : A
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive data. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
Answer : D
What is a practice of infrastructure as code?
Answer : C
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
• the CI/CD pipeline to spin up test instances.
• instances must be used to validate changes.
• changes must be validated prior to a continuous deployment workflow, and
• then push the changes to production
How should the pipeline target the required environment?
Answer : D
Refer to the exhibit. How does the architecture respond to a usage spike?
Answer : D
Refer to the exhibit. A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.
Which action resolves the issue?
Answer : D
Refer to the exhibit. An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database.
Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)
Answer : CE