What is the reason for this error message?
Refer to the exhibit. What is the reason for this error message?A . The required dependencies for the urllib3 module are not installed. B. The requests module is not installed. C. The required dependencies for the requests module are not installed. D. The site-packages directory has been corrupted.View AnswerAnswer: C
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?
Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B
Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or less
DRAG DROP Refer to the exhibit. A developer is creating a health check monitoring script that queries information from the Cisco DNA Center platform. The script must trigger an alert if a site health statistic named accessGoodCount drops below 80 and if a network statistic named latestHealthScore is 95 or...
Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?
A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions. Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?A . Store...
Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a successful continuous deployment?
Refer to the exhibit. An organization has issues with code-based failures after implementing a CI/CD pipeline to automate the builds and deployment phases of an application. Which action must be added to the pipeline, after the application is deployed in the staging environment to minimize failures and to ensure a...
Which two actions help limit the attack surface of your Docker container? (Choose two.)
Which two actions help limit the attack surface of your Docker container? (Choose two.)A . Run only a single service in each container. B. Run all services in a single image. C. Use version tags for base images and dependencies. D. Use Kali Linux as a base image. E. Download...
How should the pipeline target the required environment?
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires: • the CI/CD pipeline to spin up test instances. • instances must be used to validate changes. • changes must be validated prior to a continuous deployment workflow, and • then push the...
What is a benefit of Infrastructure as Code for the cloud?
What is a benefit of Infrastructure as Code for the cloud?A . It groups system downtime across the infrastructure B. It enables the user to automate deployments C. It does not require configuration. D. It is a cost effective solution for servicesView AnswerAnswer: B
If an attacker gains access to the scripts, what is the risk exposure?
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network. If an attacker gains access to the...
Drag and drop the scenarios from the left onto the cloud strategy categories on the right
DRAG DROP Drag and drop the scenarios from the left onto the cloud strategy categories on the right. View AnswerAnswer: