DD-Fundamental
![]() |
![]() |
![]() |
Título del Test:![]() DD-Fundamental Descripción: Exam DD |




Comentarios |
---|
NO HAY REGISTROS |
1.In the context of system memory, swap space is used to. Perform a bitwise swap on an arbitrary memory location. Substitute disk space for RAM when RAM is at capacity. Define and export a block device for external file storage. 2.The metric system.cpu.system represents the percent of time the CPU spent running. The virtual processor. The kernel. User space processes. 3.Which of the following BEST describes the role of RAM in a computer system?. It is where the applications and data that are in current use are kept. It is responsible for executing instructions of a computer program. It is a non-volatile, persistent storage device. 4.A high number of page faults usually indicates insufficient. RAM. Cpu. Storage. 5.Which two IP Address are located in the same subnet. 192.168.1.1/32 and 192.168.1.65/32. 192.168.1.1/16 and 192.168.2.1/16. 192.168.1.1/24 and 192.168.2.1/24. 6.For the IP address 192.168.1.1/24 what does the value /24 indicate?. The subnet mask value assigned to the address. The default gateway value assigned to the address. The broadcast domain for the physical network segment. 7.Compared to TCP-based communication, UDP-based communication is. Less reliable. More compressed. More secure. 8.Which of the following can be graphed with metrics exposed by cloud network monitoring. Throughput. Packet size. UDP retransmits. 9.Which of the following BEST describes the purpose of a networking port. It regulates the flow data between devices on a network. It assigns unique IP address to devices on a network. It provides a standardized endpoint for communication between devices. 10.Which component of the datadog observability platform displays all discovered services in a consilidated view. Resource catalog. Software catalog. Universal service monitoring. 11.Which of the following serve as a key foundation for datadog observability. Tags. Errors. Traces. 12.Which data types are most fundamental to observability. Metrics, logs, tags. Events, traces, log. Metrics, traces, logs. 13.Which of the following backend programming languages are fully supported by datadog. Ruby and Go. Rust and python. Javascript and C++. 14.which value MUST be set in the datadog.yaml file to enable datadog agent debug level logs. Log_level=debug. Log_level:’debug’. Log_level=’debug’. 15.In the following YAML block. Whats is the data type of excluded_filesystems? Instances; - use_mount: false Excluded_filesystems: - tmpfs - /dev/sda2 -/dev/sda. a tuple. a list. a mapping. 16.Which file is used to specify the maximum number of log files that can be tailed in paralel. auto_conf.yaml. datadog.yaml. conf.yaml. 17.What is the name of the datadog agent configuration file for agent version 6 and 7. integrations.yaml. datadog.conf. datadog.yaml. 18.What is an API keys. an alphanumeric string that serves as the public hald of a cryptographic key-pair.used to authenticate a programmatic interface. An encrypted password that authorizes programmatic read-write access to a secure HTTP endpoint. A unique identifier that acts like an authentication token for the purposes of interacting with an application programming interfaces. 19.Which of the following is the PRIMARY function of an API key. To specify the data to be returned by an API. To store the value of a request to an API. To authorize a request being made to an API. 20.What is a benefit of attaching metadata to monitored entities. It encrypts sensitive information transmitted to the datadog platform. It authenticates use accessing the monitoring dashboard. It provides additional context and attributes for organizing and filtering data. 21.An example of metadata for a datadog metric is. Timestamp. Unit. Size. 22.Which of the following autodiscovery template variables will provide the highest exposed container port for a container that exposes ports 80, 443. %%port_1%%. %%port%%. %%port_0%%. 23.To monitor an NGINX Docker container with the name custom_repo/nginx:1.21, which value should the assigned to id_identifiers in the datadog. Nginx:1.21. Custom_repo/nginx:1.21. Nginx. 24.Datadog autodiscovery automatically identifiers services running by. Executing kubectl apply -f values.yaml. Executing kubectl get service. Defining configuration templates for agent checks. 25.Which TCP ports used to expose runtime metrics about the datadog agent. 5002. 5001. 5000. 26.Which of the following inbound TCP ports is used to send traces to the datadog agent. 8080. 8123. 8126. 27.What is the purpose of the no_proxy setting in the datadog agent configuration file. To specify hosts that must bypass the configured proxy. To specify metrics that must bypass the configured proxy. To specify log data that must bypass the configured proxy. 28.The address “https://ip-ranges.datadoghq.com” is used to. Set the IP address ranges for datadog servers. Identify where the datadog agent sends observability data. Verify the addresses where the datadog agent is installed. 29.A custom agent python check called custom_apprunner.py needsto run every two minutes. What is the correct directory and contens fo the check’s configuration file. Filename: conf.d/custom_apprunner.yaml Contents: Init_config: instances: - min_collection_interval:2. Filename: checks.d/custom_apprunner.yaml Contents: init_config: instances: - min_collection_interval:120. Filename: conf.d/custom_apprunner.yaml Contents: Init_config: instances: - min_collection_interval:120. 30.Consider the following directory tree: /etc/datadog-agent/ | -- conf.d | ‘-- nicedatabase.d | |-- conf.yaml.example | ‘-- metrics.yaml |-- datadog.yaml |-- datadog.yaml.example ‘-- runtime-security.d ‘-- default.policy Which of the following sequences will configure and activate the NiceDatabase integration?. - Form conf.d/nicedatabase.d/conf.yaml.exampledatadog.yaml - Modify the NiceDatabase configuration blocks in datadog.yaml as appropriate - Run datadog-agent configcheck to run basic linting tests on the configuration. - Restart the agent. - Copy conf.d/nicedatabase.d/conf.yaml.example - to conf.d/nicedatabase.d/conf.yaml - Modify conf.d/nicedatabase.d/conf.yaml as appropriate - Restart the agent - Run datadog-agent configcheck to run basic linting tests on the configuration. - Modify conf.d/nicedatabase.d/conf.yaml as appropriate - Update runtime-security.d/default.policy to add the new integration to the allow-list - Restart the agent. 31.In datadog agent-based integrations what is a custom check?. a routine to check the compatibility of the agent with different system. A user defined function for collecting specific data. A test used to verify the integrity of the agent’s installation. 32.Which parent directory contains the subdirectory /dns_check.d?. /datadog-agent. /conf.d. /checks.d. 33.For which of the following technologies is a datadog agent-based integration available?. Google cloud. Slack. Nginx. 34.A user wants to fetch all of the their existing dashboard list definitions programmatically. What authorization scope should be assigned to the endpoint “https://api.datadoghq.com/api/v1/dashboard/lists/manual”. User_access_read. Dashboards_read. Dashboards_public_share. 35.Which reserved tags are used as part of unified service tagging. host, source, env. Service, env, version. Source, version, device. 36.Which of the following tag definitions is valid?. Namespace:kube-system-*. 2_python_version:2.7.11. Image_name:nginx/ingress. 37.Which of the following strategies does datadog recommend for tagging metrics from services running on multiple datadog supported cloud platforms?. Install the proper cloud integration and allow it to tag metrics automatically. Tag the metrics with source:cloud to enable aggragation. Create a small number of normalized tags applicable to all of the metrics. 38.Authentication or “crewler”integrations differ from datadog agent integrations in which of the following ways?. Crawlers are configured directly in the datadog application and their execution and reporting cycles are not tied to an individual agent. Agent integrations are used only to monitor system and OS-level resources and cannot access cloud resources. Unlike crawlers, the timing granualarity of agent integrations cannot be controlled; agent checks run on pre-defined timing cycles only. 39.Which of the following is true about crawler-based integrations. They leverage agents to synchronize metrics with datadog. They are used to push metrics to datadog. They are used to pull metrics into datadog. 40.Which of the following steps is required to enable a datadoh crawler-based integration to authenticate with a cloud provider?. Configure the crawler to use the cloud provider’s SDK. Create a service account identity or role in the cloud provider. Install the datadog agent on each cloud instance. 41.Which of the following mechanisms does datadog use to obtain metrics from third-party cloud services such as slack and pagerduty. Log streams. Authentication integrations. Autodiscovery. 42.What is the flush interval for DogstatsD?. 20 seconds. 30 seconds. 10 seconds. 43.What is the primary reason DogstatsD uses UDP?. UDP guaratees the data delivery. UDP is more secure than TCP. UDP is non-blocking. 44.Which DogstatsD feature is an extension of StatsD. Tagging. UDP support. Gauge metric type. 45.DogstatsD is used to. Call datadog REST API endpoints. Pull usage statistics from datadog. Send custom metrics to datadog. 46.Which of the following is BEST represented using metrics in datadog. Deployment version. Latency. Trace ID. 47. The graphs above show the system.cpu.system metric from several in the infrastructure. In the first graph the query avg:system.cpu.system{*} shows that the highest value is 4.19 in the second graph, the query avg:system.cpu.system{*} by {host} shows that the highest value is 18.32 What accounts for the difference?. The 18.32 metric value is the product of the values received from all hosts. The 18.32 metric values is the sum of the values reveived from all hosts. The 4.19 metric values is the average of the values from all hosts. 48.Which of the following visualizations is BEST for showing the historical distribution of a single metric form a large number of different, sources for example nginx.net.request_per_s from 1000 web servers)?. Stacked area graph. Bar graph. Heat map. 49.Which of the following signals does datadog aggregate to provide usefull knowledge for troubleshooting. Alerts. Metrics. Traces. 50.When a user configures tags to submit to datadog the tags. May not contain underscores. Must start with a letter. Must end with a colon. 51.Which of the following is supported syntax when filtering by tags?. Avg. Not in. Group by. 52.When a user graphs a metric by using the following query. What is the effect of including the by {host} parameter - avg:system.cpu.system{*} by {host}. It displays individual lines for each host. It filters metrics to a specific host. It excludes values not tagged with host. 53.Which features allows users to fillter, aggregate, and compare collected measurements via user defined attributes?. Tagging. Tracing. Synthetic monitoring. 54.In the host map, hosts are color-coded according to. Monitor alert status. Services check status. Host-level metric values. 55.A host named host1 will be offline for maintenance. How should a user silence alerts on host?. Stop the datadog agent on host1. In the host map, click host1 and then click mute host. In the dashboard list, open the host1 dashboard and then click the pause button. 56.The main purpose of the datadog host map and container map is to. Highlight various infrastructure metrics. Visualize various applications metrics. Manage the agent configuration. 57.Which dashboard features is used to dynamically filter one or more widgets?. Facets. Template variables. Tags. 58.What is the easiest way to begin modifying an out of the box dashboard?. Clone the dashboard. Copy the json. Export the json. 59.Consider the query below avg:system.io.r_s{app:shopist} by {host}.rollup(avg,36000) the avg and by fields represent the. Space aggregation. Scope. Time aggregation. 60.Consider the visualization of disk usage over the past week on a given host. Which metric query represents the everage disk usage, summed across all devices on the host?. sum:system.disk.used{host:abc}. cumsum(sum:system.disk.used{host:abc}). sum:system.disk.used{host:abc}.rollup(sum). 61.Which type of metric measures the amount of work a system does per unit of time. Utilization. Performance. Throughput. 62.What type of graph is BEST for comparing how a metric is performing today compared to exactly one week ago. Timeseries. Change. top list. 63.Which of the following snippets correctly generates recovery and alert notifications from a monitor?. {{#is_alert}} This is an alert {{is_alert}} {{#is_recovery}} This is a recovery {{is_recovery}}. {{#is_alert}} This is an alert {{/is_alert}} {{#is_recovery}} This is a recovery {{/is_recovery}}. {{#is_alert#}} This is an alert {{/is_alert}} {{#is_recovery#}} This is a recovery {{/is_recovery#}}. 64.A monitor has the following option enabled: “Do not notify recipients when this alertt is modified” which of the following accurately describes this monitor’s behavior when it is silenced?. The change generates an event but does not send email or other notifications. The change generates an event and send email notifications. The change does not generates an event and does not send any notifications. 65.Consider an application that is known to emit a specific metric at a specific threshold only before it is about to crash. How should a user configure a monitor to alert on that metric. Alert when the metric is above or equal to the threshold at least once dureing the last 5 minutes and do not notify if data is missing. Alert when the metric is above the threshold at all times during thhe last 5 minutes and do not notify if data is missing. Alert when the metric is above or equal to the threshold at least once during the last 5 minutes and notify if data is missing. 66.Consider an application that is stable when either network throughput or disk I/O is higher than normal, but unstable when they are both higher than normal. How can a user get a special notification only when both are high?. Create an anomaly monitor that will aggregate both metrics; the anomaly monitor will send the notification. Create two metric monitor that notify watchdog: watchdog will send the notification. Create two metric monitor and a composite monitor:the composite monitor will send the notification. 67.A user creates API keys and application keys. This user’s account is then disabled. What happens to these keys. The application keys are revoked. But the API keys remain valid. Both the application keys and the API keys are automatically revoked. The API keys are revoked. But the application keys remain valid. 68.Which of the following BEST describes the purpose of an application keys. It encrypts data in transit being sent to the datadog backend. It is used to gather system metrics. It is used with the API key to give users access to datadog’s API. 69.Which of the following commands is recommended by datadog to restart the agent on a ubuntu host. Sudo systemctl restart datadog-agent. Sudo service datadog-agent restart. Sudo restart datadog-agent. 70.After a user modifiers an agent or integration configuration file. What actions MUST be taken to load the new configuration?. Issue a reload using the config command. Restart via the native operating system controls. None, as the agent will apply them automatically. 71.To validate connectivity from the agent to the datadog account. What step should be performed?. Invoke curl to “https://app.datadoghq.com”. Run the command datadog-agent health. Run the command datadog-agent diagnose. 72.Consider the following output from the datadog agent status command Hostnames =========== Hostname: my.spesial.hostname Agent-hostname: my.spesial.hostname ec2-hostname: ip-192-0-0-1.internal Instance-id: 1-deadbeef Socket-hostname: myhost Socket-fqdn: myhost.mydomain Which the following keys will the agent use to the canonical hostname. Hostname. Agent-hostname. Instance-id. 73.The submit data, the datadog agent needs which of the following. An API keys. a client token. An application key. 74.What is the maximum number of API keys allowed in one organization by default?. 50. 75. 100. 75.Version 7 of the datadog agent embeds which of the following python runtime version(s). Python 2 and 3. Python 2. Python 3. 76.What is the datadog recommended way to install the datadog agent manually on a supported UNIX-like operating system. Mount an ISO file. Run a one-line install command. Build it using source code. 77.The datadog agent has been installed and is running on a host. But no data is reported from one of the installed integrations. What is the first action that should be taken to troubleshoot the missing data?. Check the logs from the agent. Check for valid integration YAML. Run the agent status command. 78.Which datadog agent subcommand prints the metrics and tags collected by the disk integration?. Check disk. Diagnose disk. Configcheck disk. 79.Which of the following describes the behavior of the flare command. It gathers the traces and logs into an archive, declares an incident, and the can send the archive to a designated member of the user’s organization. It gathers the security logs into an archive, declares a security incident and then can send the archive to datadog support. It gathers the agent’s configuration logs and files into an archive, scrubs any sensitivve data from the archive and then can send the archive to datadog support. 80.What command can be used to collect and send agent diagnostic data to datadog. Datadog-agent diagnose. Datadog-agent stream-logs. Datadog-agent flare. 81.What is the agent subcommand to print all configuration loaded on the datadog agent. Config. Check. Configcheck. 82.Which of the following log level options includes debug-level logs. Warn. Trace. Critical. 83.A user wants to see only critical, error and warn logs from the datadog agent on a host. What value must be the user set in the agent configuration file. Log_level:’warn’. Log_level:’critical’. Log_level:’debug’. 84.When running the datadog agent on a host, how would a user change the amount of information the agent writes to its log file. Set a different value using the command datadog-agent loglevel. Change the value for log_level in datadog.yaml. Change the value in the datadog web app under agent>configuration>logs. 85.The datadog docker agent has been installed on a docker host. When a user runs the command docker-compose exec datadog-agent-status the following output produced ======== Logs Agent ======== Logs agent is not running To enable the logs agent, which of the following values MUST be added to the environment section of the datadog service in the docker-compose.yaml file. DD_LOGS=enabled. DD_LOGS_ENABLED=true. DD_LOGS:enabled. 86.In linux, where is the main datadog configuration file located by default. /etc/datadog-agent/. /home/datadog-agent/. /opt/datadog-agent/. 87.Which of the following parameters is required in the datadog agent’s configuration file. Site. Api_key. Hostname. 88.How often is the agent-configuration updated in the host detail panel. In real-time. Every 5 minutes. Every 10 minutes. 89.Consider the following JSON payload, transmitted via HTTP POST to a metrics endpoint { “series”: [ { “metric”: “system.load.1”, “type”: 0, “points”: [ { “timestamp”: 1636629071, “value”: “this is a long string, but a scalar is required.” } ] } ] } Which of the following are included in the response?. - Code:202 - Body: {“”status””:””ok””}. - Code:400 - Body: {“”status””:””bad request””}. - Code:413 - Body: {“”status””:””payload too large””}. 90.What new configuration action will appear on a dashboard that is created by cloning an out of the box dashboard. View audit events. Create keyboard shortcut. Schedule report. |