701 Devops
![]() |
![]() |
![]() |
Título del Test:![]() 701 Devops Descripción: Practica para examen devops |




Comentarios | |
---|---|
| |
FIN DE LA LISTA |
Which git sub command copies a local commit to a remote repository? (Specify ONLY the sub command without any path or parameters.). Which of the following statements regarding microservices are true? (Choose three correct answers.). Microservices facilitate the replacement of the implementation of a specific functionality. Microservices applications are hard to scale because microservice architecture allow only one instance of each microservice. Integration tests for microservices are not possible until all microservices forming a specific application are completely developed. Interaction between microservices can be slower that the interaction of similar components within a monolithic application. Within one application, individual microservices can be updated and redeployed independent of the remaining microservices. Which statements are true regarding databases during the deployment of a new release of a service using canary deployment? (Choose two correct answers.). Changes to the database schema can take long and reduce the database performance. Traffic to the database will significantly increase because of the additional service instance. The database schema must be compatible to all running versions of a service. The database is locked while its content is copied to the canary database. Canary deployments require two synchronized instances of each database. A declarative Jenkins pipeline contains the following excerpt: parameters { string (name: "˜TargetEnvironment', defaultValue: "˜staging', description: "˜Target environment')}. How can a task use the value provided for TargetEnvironment?. {{TargetEnvironment}}. $TargetEnvironment. %TargetEnvironment%. ${params.TargetEnvironment}. $ENV{TargetEnvironment}. Which of the following HTTP headers is a CORS header?. X-CORS-Access-Token:. Location:. Referer:. Authorization:. Access-Control-Allow-Origin. Which of the following git commands is used to manage files in a repository? (Choose two correct answers.). git rm. git cp. git mv. git move. git copy. What implications does container virtualization have for DevOps? (Choose two answers.). Containers decouple the packaging of an application from its infrastructure. Containers require developers to have detailed knowledge of their IT infrastructure. Containers let developers test their software under production conditions. Containers complicate the deployment of software and require early deployment tests. Containers require application specific adjustment to the container platform. Which of the following HTTP methods are used by REST? (Choose three correct answers.). CREATE. REPLACE. PUT. DELETE. GET. The file index.php, which is being maintained in a git repository, was changed locally and contains an error. If the error has not been committed to the repository yet, which of the following git commands reverts the local copy of index.php to the latest committed version in the current branch?. git lastver "" index.php. git revert "" index.php. git checkout "" index.php. git clean "" index.php. git repair "" index.php. Which of the following statements are true about Jenkins? (Choose two correct answers.). Jenkins is specific to Java based applications. Jenkins can delegate tasks to slave nodes. Jenkins only works on local files and cannot use SCM repositories. Jenkins' functionality is determined by plugins. Jenkins includes a series of integrated testing suites. Which of the following information is contained in the output of git status? (Choose three correct answers.). Changed files that will not be part of the next commit. Locked files which cannot be edited until the lock is released. Changed files that will be part of the next commit. Unchanged files which have not been edited locally. Untracked files which are not subject to version control. What happens when a merge conflict occurs in git? (Choose two correct answers.). The conflicting files remain unchanged in the local repository. Conflict markers are added to the files. A new branch containing the remote changes is created. The affected files are flagged as conflicting. The newest version is placed in the local repository. Which configuration option in the Ansible inventory is issued control privilege escalation of the remote user?. priv_user. elevate. super. become. sudo. Which Ansible modules can be used to change the contents of a file? (Choose three correct answers.). lineinfile. replace. patch. insert. modify. What is the Puppet equivalent to an Ansible Playbook called?. A Puppet Catalog. A Puppet Playbook. A Puppet Factsheet. A Puppet Declaration. A Puppet Manifest. Which of the following Ansible tasks copies the file example.txt to a manage system?. "" rsync: src: example.txt dst: /tmp/example.txt. "" copy: src: example.txt dest: /tmp/example.txt. "" retrieve: src: example.txt dest: /tmp/example.txt. - cp: source: example.txt dst: /tmp/example.txt. - transfer: src: example.txt dest: /tmp/example.txt. Which Ansible command is used to manage and store sensitive data in encrypted files? (Specify ONLY the command without any path or parameters.). Which of the following commands lists the cookbooks available on a Chef server?. kitchen cookbook list. chef-client cookbook list. chef-server cookbook list. chef-solo cookbook list. knife cookbook list. An Ansible variable file contains the following content: myapp: option1: one Which of the following strings can be used to reference the defined variable? (Choose two correct answers). myapp(option1);. option1@myapp. myapp["˜option1']. myapp.option1. myapp{{option1}}. Which Ansible keyword is used in a playbook to store the result (i.e. return code) of a task in a variable?. register. return. output. result. set_fact. Which of the following functions are provided by the Ansible apt module? (Choose two correct answers.). Update an installed package to the latest version. Update the list of available packages from configured repositories. Re-compile an installed package from the source code. Add the URL of a new repository to the package manager configuration. Install a dpkg based Linux distribution on an empty target system. What statement is true regarding the Swarm service created by the following command? docker service create --name myweb --network webnet --mode global nginx. It runs exactly one time in the Swarm and cannot be scaled. It runs exactly once on each node in a Swarm. It runs on one node by default and can be scaled to an arbitrary number of replicas. It runs on all nodes which provide the network webnet. It runs only on those nodes which support the network type global. Which of the following mechanisms are used for service discovery in a container environment? (Choose two correct answers.). The container platform offers a command like docker service discover which should be run within a container. The container platform sets environment variables containing service information within the containers. The container platform lists localhost ports assigned to containers in each container's /etc/services file. The container platform mounts the sockets for all available services into the container's file systems. The container platforms maintains DNS records which point to containers offering a specific service. Which of the statements below are true about the volume created by the following command? (Choose two correct answers.) docker run ""v /data ""ti debian. The new /data volume contains a copy of the complete container's base image. The volume containing the container's rootfile system is retained until the /data volume is deleted. The /data volume is discarded when the container terminates. The /data volume can be attached to another Docker container. If the command is run a second time, another volume for /data is created. Which of the following commands lists the nodes in a Docker Swam cluster?. docker-swarm listnodes. docker engine ls. docker node ls. docker machine ls. docker swarm nodes. Which of the following container names could have been assigned automatically by Docker?. docker-c00001. 2.0.17.172. container. c0023817. clever_ritchie. Which elements exist on the highest level of the definition of every Kubernetes Objects? (Specify the name of one of the elements, without any values.). How is a Docker container image retrieved from a Docker registry?. Docker retrieves a ZIP archive which is extracted into the container's root file system. Multiple stacked images are retrieved and layered on top of each other. A flat hard disk image is downloaded once per container and mounted as the root file system. The registry merger all components of the image into one file which is shipped to Docker. The container is built from an ISO file along with a configuration for an unattended installation. Which docker-machine sub command outputs a list of commands that set environment variables which are required to make docker work with a Docker host managed by docker-machine? (Specify only the sub command without any path or parameters.). Given the following excerpt of a Dockerfile: Run apt-get ""y update && apt-get install ""y fortunes && apt-get clean Why are the multiple apt-get commands combined in one RUN statement instead of using multiple RUN statements?. To prevent the commands from running in parallel because Docker executes all RUN statements in their own container at the same time. To ensure the execution order of the commands because Docker might evaluate the statements of a Dockerfile in any order. To avoid the creation of unnecessary images because Docker creates a new image for each RUN statement. To execute both commands in the same container instance and void Docker to reset the container to the original base image. To execute the apt-get install command only if the apt-get update command was successful because Docker does not check the success of RUN statements. Which of the following tasks are completed by docker-compose down when it is used with additional parameters? (Choose two correct answers.). Delete all volumes defined in the composer file. Delete all volumes defined in the composer file. Delete all networks defined in the composer file. Delete all images used in the composer file from the Docker nodes. Delete all images built from the composer file from their registry. Which statement in a Dockerfile defines which command should be started in the container by default when it is started? (Specify ONLY the statement's name without any values or parameters.). The following command is issued on two docker nodes: docker network create --driver bridge isolated_nw Afterwards, one container is started at each node with the parameter --network=isolated_nw. It turns out that the containers can not interact with each other. What must be done in order to allow the containers to interact with each other? (Choose two correct answers.). Use a host network instead of a bridged network. Add the option --inter-container to the docker network create command. Start the containers on the same node. Change the --network parameter of docker create to --network=isolated_nw,nofence. Use an overlay network instead of a bridged network. If a Dockerfile references the container's base image without a specific version tag, which tag of that image is used to create the container?. latest. default. current. nightly. lts. Which docker subcommand starts a new container? (Specify only the subcommand without any path or parameters.). What happens if one of the Pods is terminated with the command kubect1 pod delete?. The remaining Pods are stopped and the Deployment switches to the state Failed. The number of replicas in the ReplicaSet is changed to 4. The ReplicaSet immediately starts a new replacement Pod. The remaining Pods are stopped and a new ReplicaSet is started. The Deployment switches to the state Degraded. A Dockerfile contains the statements: COPY data/ /data/ VOLUME /data - What happens when the resulting container is started without any additional volume configuration? (Choose two correct answers.). Files existing in /data/ in the image are not available in the running container. Changes to files within /data/ affect the Docker image and all other containers derived from it. Existing files from /data/ in the image are copied to the new volume. An error is raised because /data/ already contains data when the volume is mounted. A new volume is created and mounted to /data/ within the new container. Which section of the Prometheus configuration defines which nodes are monitored?. scrape_config. targets. rules. listener. nodes. Which of the log messages below matches the following Logstash grok filter? grok { match => ["message", "%{SYSLOGBASE} new node %{IPORHOST:node}" ]}. Jun 30 00:36:49 headnode: new node 198.51.100.103 at clustermanager:12353. Jun 30 00:36:49 headnode clustermanager[12353]: new node 198.51.100.103. Jun 30 00:36:49 headnode clustermanager[198.51.100.103]: new node. %{SYSLOG-FROM:headnode clustermanager[12353]} new node 198.51.100.103. clustermanager[12353]: Jun 30 00:36:49 headnode new node 198.51.100.103. A recently installed application writes log data to /opt/app/log/info.log. If Filebeat is already installed and set up for communication with a remote Logstash, what has to be done in order to submit the log data of the new application to Logstash?. Add an additional input channel with the option source => "/opt/app/log/info.log" to the Logstash configuration. Configure logrotate to execute filebeat ""I /opt/app/log/info.log 0 after each rotation of /opt/app/log/info.log. Add the log file to the path option within the log prospector in the Filebeat configuration and restart Filebeat. Add a new cron job that invokes filebeat ""i /opt/app/log/info.log periodically. Replace /opt/app/log/info.log by a symbolic link to /dev/filebeat and restart the new application. Which sections can exist in a Logstash configuration file? (Choose three correct answers.). output. filter. input. forward. generate. How does Prometheus gather information about monitored hosts and services?. It implements the ICMP and SNMP protocols to ping and query remote services. It opens a webhook where monitored applications have to submit various metrics. It uses HTTP to retrieve JSON encoded metrics from the monitored objects. It queries a relational database for metrics written to the database by monitored applications. It runs scripts on the Prometheus server which perform tests and return various metrics. A service should be provided to arbitrary clients on the Internet using HTTPS. Any standard client on the Internet should be able to consume the service without further configuration. Which of the following approaches can be used to implement these requirements? (Choose three correct answers.). Configure the web servers to not use a server certificate when serving HTTPS. Generate a self-signed certificates during the deployment of each backend server. Use a certificate issuing service to request certificates during each server deployment. Use a load balancer that decrypts incoming requests and passes them on in plain HTTP. Install a wildcard certificate and the respective private key on all the backend servers. Which of the following statements is true about load balancers?. Load balancers are a security risk because they obfuscate the origin of connections. Load balancer help to improve the availability and scalability of a service. Load balancers are a single point of failure because they cannot be deployed redundantly. Load balancer require access to private keys in order to be able to forward HTTPS traffic. Load balancers cannot use connection content, such as HTTP cookies, to route traffic. What does the command packer validate template.json do?. The command verifies that the latest build of the template can be run without downloading additional images or artifacts. The command verifies that the file template.json is a syntactically correct and complete Packer template. The command verifies that all existing artifacts generated by template.json have their original checksums. The command verifies that all source images referenced in template.json are available and have valid cryptographic signatures. The command verifies that images generated previously by template.json still use the most recent source images. Which security issues exist for most publicly available Vagrant boxes? (Choose three correct answers.). They accept SSH logins from the user vagrant with the password vagrant. They accept SSH logins from the user vagrant with a publicly available SSH key pair. The vagrant user can use sudo to obtain root privileges without additional authentication. Their whole file system, including configuration files, is writable by any user, including vagrant. They export their file system via NFS with full write permissions without any additional restrictions. How does Vagrant run virtual machines?. Vagrant uses a vagrant-specific hypervisor called VagrantVM. Vagrant has to be run within a running virtual machine which is not controlled by Vagrant. Vagrant ships with an embedded version of VirtualBox. Vagrant uses so-called provides which control external hypervisors such as VirtualBox. Vagrant generates virtual machine images but does not provide a mechanism to run them. What must be the first line of a plain text user-data configuration containing YAML configuration for cloud-init?. cloud-config:. --- cloud-config. #!/usr/bin/cloud-init. [cloud-config]. #cloud-config. Which of the following sections must exist in a Packer template?. images. provisioners. builders. variables. post-processsors. How is cloud-init integrated with a managed system image?. cloud-init provides the cloud-init-worker command which has to be invoked periodically within the running instance. cloud-init provides systemd units which must be included in several stages of the booting process of the instance. cloud-init provides its own startup mechanism which replaces the instance's original init system, such as systemd. cloud-init provides a Linux kernel module that must be included and loaded in the instance's initramfs. cloud-init provides the cloud-init-daemon service which is launched during startup and keeps the instance in sync with the desired configuration. Which vagrant sub command executes a command in a running box? (Specify only the sub command without any path or parameters.). Which of the following elements are presents in a Vagrant box file? (Choose two correct answers.). A Vagrant guest configuration file that is used to create instances of the box. Configuration files for provisioners such as Ansible. The installer for the Vagrant version which is required to run the box. A metadata file describing the box and its requirements. A base file system image in a format supported by the provider of the box. Which of the following statements describes the principal concept behind test driven development?. Tests may not be written by the same development team that wrote the tested code. All tests are generated automatically from the tested source code. Tests are written before the function / method is implemented. The only acceptable reason to write a test is to prevent fixed bugs from occurring again. Instead of testing software automatically, manual tests are performed and logged daily. Which of the following goals are favored by agile software development methodologies? (Choose two correct answers.). Self-organization of teams. Central governance and control. Flexibility of processes. Absolute planning adherence. Long-term release and feature management. Which of the following properties apply to a content delivery network? (Choose three correct answers.). CDNs require all elements of a web site to be served by the same CDN. CDNs can stream large media files such as movies or music to clients. CDNs are present in multiple locations to serve content close to clients. CDNs serve huge numbers of clients with high bandwidth and low latency. CDNs forward all requests to a backend server and never store content locally. Which of the following kinds of data are suitable as artifacts in a continuous delivery pipeline? (Choose three correct answers.). Executable applications such as .exe files or .jar packages. Copies of the contents of source code repositories. Build configuration files such as Makefiles or Maven configurations. Compiled packages to be installed by a Linux package manager. Docker container images which contain an application. Which of the following conditionals exist in an Ansible playbook? (Choose three correct answers.). with_nodes. with_playbook. with_sequence. with_items. with_nested. Which of the following tasks can Logstash fulfill without using other components of the Elastic Stack? (Choose three.). Receive log data from remote systems. Store log data persistently. Aggregate log data over a period of time. Process log data to extract information. Forward log data to other services. What is tested by unit tests?. The syntactical correctness of the source code of a software component. The formal validity of a service's external REST API. The integration of multiple component of the same software. The correctness of a specific function of a software component. The throughput, load capacity and latency of a service. An online shop needs to store information about clients and orders. A list of fixed properties for clients and orders exists. The data storage should enforce specific data types on these properties and ensure that each order is associated with an existing client. Which of the following cloud services is capable of fulfilling these requirements?. An in-memory database like memcached. An object store like OpenStack Swift. A messaging service like OpenStack Zaqar. A NoSQL database like MongoDB. A relational database like MariaDB. |