Which action should the system administrator take to start looking for the cause of this issue?
An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action should the system administrator take to start looking for the...
Which release strategy should be used by the IT department?
An IT department needs to deploy a new application named ‘Entfin434772390’ across the entire enterprise. The deployment must gradually transfer user traffic from an on older and nearly identical version of the application named ‘Entfin02754932l’. Both versions of the application are running in the production environment. Which release strategy should...
What kind of high-availability configuration is the developer running?
A developer wants to deploy a highly available web server cluster and decides to put a load balancer in front of multiple clustered nodes that run the same web service. The goal is for the load balancer to take in users and distribute the load across the whole cluster. What...
As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?
As a department starts following NetDevOps principles, how should the network monitoring strategy be updated to provide more visibility into the user experience?A . Leverage machine learning tools to more quickly identify problems m syslog and SNMP data B. Update tools to pull or stream monitoring metrics from APIs instead...
What is an advantage of using configuration management tools to automate infrastructure services?
What is an advantage of using configuration management tools to automate infrastructure services?A . eliminates the need to run integration tests within the CI/CD pipeline B. provides high native monitoring of services C. eliminates the need for CI/CD tools D. integrates with container orchestrationView AnswerAnswer: C
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?A . encode the value with base64 in a secure DNS CTEXT entry B. as an environment variable in the Dockerfile C. Docker environment variable D. Docker secretsView AnswerAnswer:...
Which action resolves the error?
Refer to the exhibit. The push_configs.yml playbook returns the error shown. Which action resolves the error?A . Install the Paramiko library on the host that runs Ansible B. Generate a new SSH key pair and add the public key to the target machine C. Export the ANSIBLE_HOST_KEY_CHECKING=False variable D. Comment...
Which metric must be used to trigger autoscaling events?
A developer is creating an application based on microservices. The application will be used as a central repository for all company's documents. One of the microservices in the application will perform image processing. This microservice must autoscale to meet the current load and avoid down time. Which metric must be...
Which CI solution uses this file?
Refer to the exhibit. Which CI solution uses this file?A . Drone B. GitLab CI C. Travis CI D. JenkinsView AnswerAnswer: A Explanation: syntax for GitLab CI, Travis CI & Jenkins are "stage...", while Drone use "steps..." Here are the configuration files I referred https://docs.drone.io/pipeline/environment/syntax/ https://docs.gitlab.com/ee/ci/yaml/includes.html https://blog.travis-ci.com/2019-05-30-setting-up-a-ci-cd-process-on-github https://www.jenkins.io/doc/pipeline/examples/
Which action allows the development team to reach the deployed application?
Refer to the exhibit. Which action allows the development team to reach the deployed application?A . Create an init container to initialize routes for the containers in the pod B. Create a service to expose the logic running in the pod C. Delete the deployment and redeploy by using a...