option
Cuestiones
ayuda
daypo
buscar.php

Devops 701-100

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Devops 701-100

Descripción:
devops sysadmin

Fecha de Creación: 2023/08/02

Categoría: Informática

Número Preguntas: 120

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which statement in a Dockerfile defines which command should be started in the container by default when it is started? (Specify ONLY the statement's name without any values or parameters.).

Which docker-machine sub command outputs a list of commands that set environment variables which are required to make docker work with a Docker host managed by docker-machine? (Specify only the sub command without any path or parameters.).

Which git sub command copies a local commit to a remote repository? (Specify ONLY the sub command without any path or parameters.).

Which vagrant sub command executes a command in a running box? (Specify only the sub command without any path or parameters.).

Which docker subcommand starts a new container? (Specify only the subcommand without any path or parameters.).

Which elements exist on the highest level of the definition of every Kubernetes Objects? (Specify the name of one of the elements, without any values.).

Which Ansible command is used to manage and store sensitive data in encrypted files? (Specify ONLY the command without any path or parameters.).

QUESTION 1 Which of the log messages below matches the following Logstash grok filter? grok { match => [“message”, “%{SYSLOGBASE} new node %{IPORHOST:node}” ] }. Jun 30 00:36:49 headnode: new node 198.51.100.103 at clustermanager:12353. Jun 30 00:36:49 headnode clustermanager[12353]: new node 198.51.100.103. Jun 30 00:36:49 headnode clustermanager[198.51.100.103]: new node. %{SYSLOG-FROM:headnode clustermanager[12353]} new node 198.51.100.103. clustermanager[12353]: Jun 30 00:36:49 headnode new node 198.51.100.103.

Which Ansible keyword is used in a playbook to store the result (i.e. return code) of a task in a variable?. register. return. output. result. set_fact.

Which of the following elements are presents in a Vagrant box file? (Choose two correct answers.). A Vagrant guest configuration file that is used to create instances of the box. Configuration files for provisioners such as Ansible. The installer for the Vagrant version which is required to run the box. A metadata file describing the box and its requirements. A base file system image in a format supported by the provider of the box.

A recently installed application writes log data to /opt/app/log/info.log. If Filebeat is already installed and set up for communication with a remote Logstash, what has to be done in order to submit the log data of the new application to Logstash?. Add an additional input channel with the option source => “/opt/app/log/info.log” to the Logstash configuration. Configure logrotate to execute filebeat –I /opt/app/log/info.log 0 after each rotation of /opt/app/log/info.log. Add the log file to the path option within the log prospector in the Filebeat configuration and restart Filebeat. Add a new cron job that invokes filebeat –i /opt/app/log/info.log periodically. Replace /opt/app/log/info.log by a symbolic link to /dev/filebeat and restart the new application.

A Dockerfile contains the statements: COPY data/ /data/ VOLUME /data What happens when the resulting container is started without any additional volume configuration? (Choose two correct answers.). Files existing in /data/ in the image are not available in the running container. Changes to files within /data/ affect the Docker image and all other containers derived from it. Existing files from /data/ in the image are copied to the new volume. An error is raised because /data/ already contains data when the volume is mounted. A new volume is created and mounted to /data/ within the new container.

A declarative Jenkins pipeline contains the following excerpt: parameters { string (name: ‘TargetEnvironment’, defaultValue: ‘staging’, description: ‘Target environment’) } How can a task use the value provided for TargetEnvironment?. {{TargetEnvironment}}. $TargetEnvironment. %TargetEnvironment%. ${params.TargetEnvironment}. $ENV{TargetEnvironment}.

Which of the following commands lists the nodes in a Docker Swam cluster?. docker-swarm listnodes. docker engine ls. docker node ls. docker machine ls. docker swarm nodes.

Which sections can exist in a Logstash configuration file? (Choose three correct answers.). output. filter. input. forward. generate.

An Ansible variable file contains the following content: myapp: option1: one Which of the following strings can be used to reference the defined variable? (Choose two correct answers). myapp(option1);. option1@myapp. myapp[‘option1’]. myapp.option1. myapp{{option1}}.

Which of the following tasks are completed by docker-compose down when it is used with additional parameters? (Choose two correct answers.). Delete all volumes defined in the composer file. Delete all containers defined in the composer file. Delete all networks defined in the composer file. Delete all images used in the composer file from the Docker nodes. Delete all images built from the composer file from their registry.

Given the following excerpt of a Dockerfile: Run apt-get –y update && apt-get install –y fortunes && apt-get clean Why are the multiple apt-get commands combined in one RUN statement instead of using multiple RUN statements?. To prevent the commands from running in parallel because Docker executes all RUN statements in their own container at the same time. To ensure the execution order of the commands because Docker might evaluate the statements of a Dockerfile in any order. To avoid the creation of unnecessary images because Docker creates a new image for each RUN statement. To execute both commands in the same container instance and void Docker to reset the container to the original base image. To execute the apt-get install command only if the apt-get update command was successful because Docker does not check the success of RUN statements.

What implications does container virtualization have for DevOps? (Choose two answers.). Containers decouple the packaging of an application from its infrastructure. Containers require developers to have detailed knowledge of their IT infrastructure. Containers let developers test their software under production conditions. Containers complicate the deployment of software and require early deployment tests. Containers require application specific adjustment to the container platform.

A service should be provided to arbitrary clients on the Internet using HTTPS. Any standard client on the Internet should be able to consume the service without further configuration. Which of the following approaches can be used to implement these requirements? (Choose three correct answers.). Configure the web servers to not use a server certificate when serving HTTPS. Generate a self-signed certificates during the deployment of each backend server. Use a certificate issuing service to request certificates during each server deployment. Use a load balancer that decrypts incoming requests and passes them on in plain HTTP. Install a wildcard certificate and the respective private key on all the backend servers.

Which of the following HTTP headers is a CORS header?. X-CORS-Access-Token:. Location:. Referer:. Authorization:. Access-Control-Allow-Origin.

What must be the first line of a plain text user-data configuration containing YAML configuration for cloud-init?. cloud-config:. --- cloud-config. #!/usr/bin/cloud-init. [cloud-config]. #cloud-config.

Which of the following sections must exist in a Packer template?. images. provisioners. builders. variables. post-processsors.

If a Dockerfile references the container’s base image without a specific version tag, which tag of that image is used to create the container?. latest. default. current. nightly. lts.

Which of the following git commands is used to manage files in a repository? (Choose two correct answers.). git rm. git cp. git mv. git move. git copy.

Which of the following properties apply to a content delivery network? (Choose three correct answers.). CDNs require all elements of a web site to be served by the same CDN. CDNs can stream large media files such as movies or music to clients. CDNs are present in multiple locations to serve content close to clients. CDNs serve huge numbers of clients with high bandwidth and low latency. CDNs forward all requests to a backend server and never store content locally.

How is cloud-init integrated with a managed system image?. cloud-init provides the cloud-init-worker command which has to be invoked periodically within the running instance. cloud-init provides systemd units which must be included in several stages of the booting process of the instance. cloud-init provides its own startup mechanism which replaces the instance’s original init system, such as systemd. cloud-init provides a Linux kernel module that must be included and loaded in the instance’s initramfs. cloud-init provides the cloud-init-daemon service which is launched during startup and keeps the instance in sync with the desired configuration.

Which configuration option in the Ansible inventory is issued control privilege escalation of the remote user?. priv_user. elevate. super. become. sudo.

Which of the following commands lists the cookbooks available on a Chef server?. kitchen cookbook list. chef-client cookbook list. chef-server cookbook list. chef-solo cookbook list. knife cookbook list.

Which of the following container names could have been assigned automatically by Docker?. docker-c00001. 2.0.17.172. container. c0023817. clever_ritchie.

Which of the following statements describes the principal concept behind test driven development?. Tests may not be written by the same development team that wrote the tested code. All tests are generated automatically from the tested source code. Tests are written before the function / method is implemented. The only acceptable reason to write a test is to prevent fixed bugs from occurring again. Instead of testing software automatically, manual tests are performed and logged daily.

What statement is true regarding the Swarm service created by the following command? docker service create --name myweb --network webnet --mode global nginx. It runs exactly one time in the Swarm and cannot be scaled. It runs exactly once on each node in a Swarm. It runs on one node by default and can be scaled to an arbitrary number of replicas. It runs on all nodes which provide the network webnet. It runs only on those nodes which support the network type global.

Which of the statements below are true about the volume created by the following command? (Choose two correct answers.) docker run –v /data –ti debian. The new /data volume contains a copy of the complete container’s base image. The volume containing the container’s rootfile system is retained until the /data volume is deleted. The /data volume is discarded when the container terminates. The /data volume can be attached to another Docker container. If the command is run a second time, another volume for /data is created.

Which of the following functions are provided by the Ansible apt module? (Choose two correct answers.). Update an installed package to the latest version. Update the list of available packages from configured repositories. Re-compile an installed package from the source code. Add the URL of a new repository to the package manager configuration. Install a dpkg based Linux distribution on an empty target system.

The file index.php, which is being maintained in a git repository, was changed locally and contains an error. If the error has not been committed to the repository yet, which of the following git commands reverts the local copy of index.php to the latest committed version in the current branch?. git lastver – index.php. git revert – index.php. git checkout – index.php. git clean – index.php. git repair – index.php.

What happens when a merge conflict occurs in git? (Choose two correct answers.). The conflicting files remain unchanged in the local repository. Conflict markers are added to the files. A new branch containing the remote changes is created. The affected files are flagged as conflicting. The newest version is placed in the local repository.

An online shop needs to store information about clients and orders. A list of fixed properties for clients and orders exists. The data storage should enforce specific data types on these properties and ensure that each order is associated with an existing client. Which of the following cloud services is capable of fulfilling these requirements?. An in-memory database like memcached. An object store like OpenStack Swift. A messaging service like OpenStack Zaqar. A NoSQL database like MongoDB. A relational database like MariaDB.

Which of the following statements is true about load balancers?. Load balancers are a security risk because they obfuscate the origin of connections. Load balancer help to improve the availability and scalability of a service. Load balancers are a single point of failure because they cannot be deployed redundantly. Load balancer require access to private keys in order to be able to forward HTTPS traffic. Load balancers cannot use connection content, such as HTTP cookies, to route traffic.

Which security issues exist for most publicly available Vagrant boxes? (Choose three correct answers.). They accept SSH logins from the user vagrant with the password vagrant. They accept SSH logins from the user vagrant with a publicly available SSH key pair. The vagrant user can use sudo to obtain root privileges without additional authentication. Their whole file system, including configuration files, is writable by any user, including vagrant. They export their file system via NFS with full write permissions without any additional restrictions.

Which of the following Ansible tasks copies the file example.txt to a manage system?. – rsync:src: example.txtdst: /tmp/example.txt. – copy:src: example.txtdest: /tmp/example.txt. – retrieve:src: example.txtdest: /tmp/example.txt. - cp:source: example.txtdst: /tmp/example.txt. - transfer:src: example.txtdest: /tmp/example.txt.

How is a Docker container image retrieved from a Docker registry?. Docker retrieves a ZIP archive which is extracted into the container’s root file system. Multiple stacked images are retrieved and layered on top of each other. A flat hard disk image is downloaded once per container and mounted as the root file system. The registry merger all components of the image into one file which is shipped to Docker. The container is built from an ISO file along with a configuration for an unattended installation.

Which statements are true regarding databases during the deployment of a new release of a service using canary deployment? (Choose two correct answers.). Changes to the database schema can take long and reduce the database performance. Traffic to the database will significantly increase because of the additional service instance. The database schema must be compatible to all running versions of a service. The database is locked while its content is copied to the canary database. Canary deployments require two synchronized instances of each database.

Which of the following mechanisms are used for service discovery in a container environment? (Choose two correct answers.). The container platform offers a command like docker service discover which should be run within a container. The container platform sets environment variables containing service information within the containers. The container platform lists localhost ports assigned to containers in each container’s /etc/services file. The container platform mounts the sockets for all available services into the container’s file systems. The container platforms maintains DNS records which point to containers offering a specific service.

Which of the following statements are true about Jenkins? (Choose two correct answers.). Jenkins is specific to Java based applications. Jenkins can delegate tasks to slave nodes. Jenkins only works on local files and cannot use SCM repositories. Jenkins’ functionality is determined by plugins. Jenkins includes a series of integrated testing suites.

What is tested by unit tests?. The syntactical correctness of the source code of a software component. The formal validity of a service’s external REST API. The integration of multiple component of the same software. The correctness of a specific function of a software component. The throughput, load capacity and latency of a service.

Which of the following HTTP methods are used by REST? (Choose three correct answers.). CREATE. REPLACE. PUT. DELETE. GET.

Which of the following kinds of data are suitable as artifacts in a continuous delivery pipeline? (Choose three correct answers.). Executable applications such as .exe files or .jar packages. Copies of the contents of source code repositories. Build configuration files such as Makefiles or Maven configurations. Compiled packages to be installed by a Linux package manager. Docker container images which contain an application.

Which of the following statements regarding microservices are true? (Choose three correct answers.). Microservices facilitate the replacement of the implementation of a specific functionality. Microservices applications are hard to scale because microservice architecture allow only one instance of each microservice. Integration tests for microservices are not possible until all microservices forming a specific application are completely developed. Interaction between microservices can be slower that the interaction of similar components within a monolithic application. Within one application, individual microservices can be updated and redeployed independent of the remaining microservices.

What does the command packer validate template.json do?. The command verifies that the latest build of the template can be run without downloading additional images or artifacts. The command verifies that the file template.json is a syntactically correct and complete Packer template. The command verifies that all existing artifacts generated by template.json have their original checksums. The command verifies that all source images referenced in template.json are available and have valid cryptographic signatures. The command verifies that images generated previously by template.json still use the most recent source images.

Which of the following information is contained in the output of git status? (Choose three correct answers.). Changed files that will not be part of the next commit. Locked files which cannot be edited until the lock is released. Changed files that will be part of the next commit. Unchanged files which have not been edited locally. Untracked files which are not subject to version control.

Which section of the Prometheus configuration defines which nodes are monitored?. scrape_config. targets. rules. listener. nodes.

Which of the following tasks can Logstash fulfill without using other components of the Elastic Stack? (Choose three.). Receive log data from remote systems. Store log data persistently. Aggregate log data over a period of time. Process log data to extract information. Forward log data to other services.

Consider the following Kubernetes Deployment: The remaining Pods are stopped and the Deployment switches to the state Failed. The number of replicas in the ReplicaSet is changed to 4. The ReplicaSet immediately starts a new replacement Pod. The remaining Pods are stopped and a new ReplicaSet is started. The Deployment switches to the state Degraded.

Which of the following goals are favored by agile software development methodologies? (Choose two correct answers.). Self-organization of teams. Central governance and control. Flexibility of processes. Absolute planning adherence. Long-term release and feature management.

How does Vagrant run virtual machines?. Vagrant uses a vagrant-specific hypervisor called VagrantVM. Vagrant has to be run within a running virtual machine which is not controlled by Vagrant. Vagrant ships with an embedded version of VirtualBox. Vagrant uses so-called provides which control external hypervisors such as VirtualBox. Vagrant generates virtual machine images but does not provide a mechanism to run them.

How does Prometheus gather information about monitored hosts and services?. It implements the ICMP and SNMP protocols to ping and query remote services. It opens a webhook where monitored applications have to submit various metrics. It uses HTTP to retrieve JSON encoded metrics from the monitored objects. It queries a relational database for metrics written to the database by monitored applications. It runs scripts on the Prometheus server which perform tests and return various metrics.

The following command is issued on two docker nodes: docker network create --driver bridge isolated_nw Afterwards, one container is started at each node with the parameter --network=isolated_nw. It turns out that the containers can not interact with each other. What must be done in order to allow the containers to interact with each other? (Choose two correct answers.). Use a host network instead of a bridged network. Add the option --inter-container to the docker network create command. Start the containers on the same node. Change the --network parameter of docker create to --network=isolated_nw,nofence. Use an overlay network instead of a bridged network.

Which of the following conditionals exist in an Ansible playbook? (Choose three correct answers.). with_nodes. with_playbook. with_sequence. with_items. with_nested.

What is the Puppet equivalent to an Ansible Playbook called?. A Puppet Catalog. A Puppet Playbook. A Puppet Factsheet. A Puppet Declaration. A Puppet Manifest.

Which Ansible modules can be used to change the contents of a file? (Choose three correct answers.). lineinfile. replace. patch. insert. modify.

What is CoreOS Container Linux?. A Linux based operating system distribution for running container host and clusters. A container virtualization engine for the Linux kernel, similar to docker and rkt. A simplified Linux distribution whic only host Docker containers without any additional management interface. A container orchestration tool which supports Docker and rkt containers. A Linux distribution optimized to be used as the base image for creating container images.

Which sub command of docker volumen deletes all volumes which are not associated with a container? (Specify ONLY the sub command without any path or parameterr).

Which property of a Kubernetes Deployment specifies the number of instances to créate for a specific Pod? (Specify ONLY the option name, no matter of its location in the object hierarchy).

Which of the following tasks are achievable using docker‐machine? (Choose THREE correct answers). Start and stop Docker containers on remote Docker hosts. Set environment variables to configure the docker command. Install a new Docker host in a virtual machine. Migrate running containers from one Docker host to another. Open an interactive Shell on a remote Docker host using an SSH connection.

What happens when the following command is executed twice in succession? doker run –tid –v data:/data debían bash. The second command invocation fails with an error stating that the volumen data is already associated with a running container. The container resulting from the second invocation can only read the content of /data/ and can not change it. The original content of the contents of the data is available in both containers, although changes stay local within each container. Both containers share the container of the data volume, have full permissions to alter its content and mutually see their repective changes. Each container is equipped with its own independent data volumen, available at /data/ in the respective container.

Given the following Kubernetes deployment: NAME DESIRED CURRENT UP‐TO‐DATE AVAILABLE AGE myapp 2 2 2 0 17s Which command scales the application to five containers?. Kubectl edit deployment/myapp replicas=5. Kubectl deployment myapp replicas=5. Kubectl scale deployment/myapp –replicas=5. Kubectl replicate deployment/myapp +3. Kubectl clone deployment/myapp 3.

A docker swarm contains the following node: ID HOSTNAME STATUS AVAILABILITY MANAGERSTATUS 162jocpx41h8kdjt98kao8qek node‐5 Ready active Reachable 2ds7z8m2poifjsiqbngbsmavp node‐4 Ready active Reachable fv7p1b2i2swo916zypyohiyfa node‐3 Ready active hrr0eouc6qhnoihndt8uu610g node‐2 Ready active txgjvd0azv0mzsjj6o7ob00h8 * node‐1 Ready active Leader Whic of the nodes should be configured as DOCKER_HOST in order to run services on the swarm? (Specify ONLY the HOSTNAME of one of the potential target nodes).

After creating a new Docker network using the following command: docker network create –driver bridge isolated_nw which parameter must be added to docker create in order to attach a container to the network?. ‐‐attach=isolated_nw. ‐‐network=isolated_nw. ‐‐ethernet=isolated_nw. ‐‐alias=isolated_nw. ‐‐eth0=isolated_nw.

The file myapp.yml exists with the following content: versión: “3” services: frontend: image: frontend ports: • “80:80” backend: image: backend deploy: replicas: 2 Given that file was successfully processed by docker stack deploy myapp –compose—file myapp.yml, which of the following objects might be created? (Choose THREE correct answers). An overlay network called myapp_default. A node called myapp_frontend. A container called myapp_backend.2.ymia7v7of5g02j3j3i1btt8z. A volumen called myapp_frontend.1. A service called myapp_frontend.

If a Dockerfile contains the following lines: Run cd /tmp Run echo test > test where is the file test located?. /tmp/test within the container image. test in the directory holding the Dockerfile. /root/test within the container image. /tmp/test on the system running docker build. /test within the container image.

When creating a new Docker network, which mechanisms are available for address assignments to containers on the new nerwork? (Choose TWO correct answers.). By default, Docker chooses an unused private address space and assigns addresses from this network to containers. All networked containers must contain at least one IPADDRESS statement in their Dockerfile specifying the container´s address. Docker does not configure IP addresses and relies on the containers to configure their network interface with a calid IP address. By defaulr, Docker requests one address per container using DHCP on the interface used by the host system´s default route. docker network create allows specifying a network to be used for container addressing using ‐‐subnet.

Which of following staments in a Dockerfile leads to a container which outputs hello world? (Choose TWO correct answers). ENTRYPOINT “echo Hello World”. ENTRYPOINT echo Hello World. ENTRYPOINT [ “echo”, “hello”, “world” ]. ENTRYPOINT [ “echo hello world” ] No. ENTRYPOINT “echo”, “Hello”, “World”.

Which of the following values would be valid in the FROM statement in a Dockerfile?. file: /tmp/ubuntu/Dockerfile. registry:ubuntu:xenial. docker://ubuntu:xenial. ubuntu:xenial. http://docker.example.com/images/ubuntu-xenial.iso.

If docker stack is to be used to run a Docker Compose file on a Docker Swarm, how are the images referenced in the Docker Compase configuration made available on the Swarm nodes?. docker stack intructs the Swarm nodes to pull the images from a registry, although it does not upload the images to the registry. docker stack transfers the image from its local Docker cache to each Swarm node. docker stack passes the images to the Swarm master which distributes the images to all other Swarm nodes. docker stack builds the images locally and copies them to only those Swarm nodes which run the service. docker stack triggers the build process for the images on all nodes of the Swarm.

What is the purpose of a .dockerignore file?. It specifies which parts of a Dockerfile should be ignored when building a Docker image. It musr be placed in the top level directory of volumes that Docker should never attach automatically to a container. It exists in the root file system of containers that should ignore volumes and ports provided by Docker. It specifies files that Docker does not submit to the Docker aemon when building a Docker image. It lists files existing in a Docker image which should be excluded when building a derivative image.

After setting up a data container using the following command: docker create –v /data ‐‐name datastore debian /bin/true how is an additional new container started which shares the /data volume with the datastore container?. docker run ‐‐volumes‐from datastore ‐‐name service debian bash. doker run ‐‐share‐with datastore ‐‐name service debian bash. docker run –v /data ‐‐name service debian bash. docker run –v datastore:/data – name service debian bash. docker run ‐‐volumen‐backend datastore –v /data ‐‐name service debian bash.

Which of the following HTTP requests could stem from the communication with a RESTful service? ( Choose THREE correct answers). SET /api/clients/1234?name=John%20Doe. GET /api/clients.php?action=delete&client_id=1234. DELETE /api/clients/1234. GET /api.php?cmd=get. GET /api/clients.

What is true about a commit in git?. A commit can be changed if it has not been uploaded to a remote repository. A commit contains information about all branches of a given repository. A commit requires all remotes of repository to be synchronized before completing. A commit has to be acknowledged by all remote repositories before it is completed. A commit can contain changes to the content of submodules of a repository.

Which of the following statements are true about an object storage system as OpenStack Swift? (Choose TWO correct answers). Objects can be associated with CORS headers which are served to a client retrieving the object. Object names are not allowed to contain the / character because all objects are kept in a flat hierarchy. Objects with a name ending in .htaccess are parsed as configuration files to limit access to other objects. Objects are accesible vi HTTP and, given appropriate permissions, can be embedded in a web site. Objects flagged as executable can contain script code which is run on the object store when the object is accessed.

What is the difference between the commands git diff and git diff ‐‐cached? (Choose TWO correct answers). git diff ‐‐cached shows changes of all commits that were not pushed to origin yet. git diff shows changes that were nor addes to the next commit. git diff and git diff ‐‐cached always lead to the same result if a repository does not have at least one remote repository. git diff ‐‐cached shows changes that will be included in the next commit. git diff ‐‐cached shows changes included in the last successful commit of the current branch.

In a continuous delivery pipeline, which of the following stages exist?(Choose THREE correct answers). Deploy. Decommission. Test. Code. Build.

After creating a new file within a directory which to a Git repository, which commands have to be used in order to make Git manage the new file and upload it to the already existing remote origin?(Choose THREE correct answers). git init. git push. git commit. git add. git remote.

Which of the following statements are true when using continuous deliveryfor an application which is subject to strong compliance requirements, such as an SLA?(Choose TWO correct answers). Given a sufficient number of test, continuous deployment has no implications on the compliance of an application. The deployment to production should be subject to manual review and approval. Continuous delivery limits the risks associated with deployment by using tested automatic procedures. Continuous delibery increases the risks associated with deployment and is not suited for compliance critical applications. The deployment and reléase of software does not affect the compliance of an application in general.

Which of the following values stems from the Agile Manifesto?. Processes and tools over individuals and interactions. Contract negotiation over customer collaboration. Comprehensive documentation over working software. Predictability and long‐term planning over flexibility and adaption. Responding to change over following a plan.

Which of the following statements are tru regarding microservices? (Choose TWO correct answers). Microservices limit the risk of updates and deployments because failures only affect a limited amount of functionality. Microservices allow the conbination of different application development platforms within one application. Microservices complicate updates because individual microservices cannot be changed once an application is delivered. Microservices interact faster tan components within a monolithic software application due to their standardized APIs. Microservices are not suited for container deployments due to their complexity and resource consumption.

Which of the following forms of software is used by Cloud Foundry to deploy an application?. An executable file, such as a binary program, script or application archive, which run son the platform´s standard runtime enviromment. A Cloud Foundry Object file (.cfo) which has to be created from the application´s object code using the cf1 linker. A virtual machine image which contains an operating system, the application and all required dependencies. A TGZ archive containing the source code used by Cloud Foundry to build and install the application. The URL to a Git repository containing the source code used by Cloud Foundry to Build and install the application.

Which of the following benefits are realized by using immutable servers? ( Choose TWO correct answers). Immutable servers are flexible in how they are configured during their deployment. Immutable servers are not connected to a nerwork and cannot be attacked remotely. Immutacle servers are usable right after they are started without further configuration. Immutable servers bundle all components required for an application and never need external services. Immutable servers ensure production servers are identical staging servers.

In order to execute one step of a declarative Jenkins pipeline on a Jenkins node with a specific set of labels, which element has to be present in the respective stage?. server. executor. slave. agent. selector.

What is the purpose of cloud‐init?. Assign an IaaS instance to a specific computing node within a cloud. Standardize the configuration of infrastructure services, such as load balancers or virtual firewalls in a cloud. Prepare the generic image of an IaaS instance to fit a specific instance´s configuration. Replace common Linux init systems, such as systemd or SysV init. Orchestrate the creation and start of multiple related IaaS Instances.

How does Packer interact with system images?. Packer creates an instance based on a source image, prepares the instance through a network connection and bundles the resulting. Packer has to be installed within the target image and is executed during the image´s first boot in order to execute preparation tasks. Packer installs a client within the image which has to be run periodically via cron in order to retrieve the latest template from the Packer server and appy it locally. Packer downloads and extracts an image in order to make changes to the image´s file system, repack the modified image and upload it again. Packer periodically connects through the network to the Packer daemons of all running Packer images in order to re‐apply the wholw template to the running instance.

What is the default provider of Vagrant?. virtualbox. docker. vmware_workstation. lxc. hyperv.

What is the purpose of the command vagrant init?. It installs Vagrant on a Linux host. It creates a Vagrant configuration file. It downloads a Vagrant box. It starts a Vagrant box. It executes a provisioning tool in a running box.

What the purpose of the packer inspect subcommand?. Show usage statistics of a Packer image. Retrieve files from an existing Packer image. Display an overview of the configuration contained in a Packer template. List the artifacts created during the build process of a Packer image. Execute commands within a running instance of a Packer image.

Which functionality is provided by Vagrant as well as by Docker? (Choose THREE correct answers). Both can download required base images. Both can apply changes to a base image before running it. Both start system images as virtual machines by default. Both start system images as containers by default. Both can share directories from the host file system to a guest.

Which of the following kinds of data can cloud‐init process directly from user‐data? ( Choose THREE correct answers). ISO images to boot from. Cloud‐config declarations in YAML. Base64‐encoded binary files to execute. Shell scripts to execute. List of URLs to import.

Which Ansible command line tool is used to download, install and manage roles from a public community site or an SCM such as Git? (Specify ONLY the command without any path or parameters).

Which of the following Ansible tasks install the packages example‐a and example‐b using the Ansible yum module? (Choose TWO correct answers). – yum: name: “{{ item }}” ítems: ‐example‐a ‐example‐b. – yum: name: “ {{ item }} “ state: present with_items: ‐{ example‐a, example‐b }. –yum: name: “ {{ ítem }} “ state: present with_items: ‐example‐a, example‐b. –yum: name: “{{ ítem }}” state: present foreach ítem: ‐ example‐a ‐ example‐b. –yum: name: “ {{ ítem }} “ state: present with_items: ‐example‐a ‐example‐b.

Using the Ansible cron module a crontab entry should be created for example.sh which runs once after reboot. Which of the following is a calid Ansible task for this purpose?. –cron: Reboot: “ /usr/local/bin/example,sh. –cron: special: reboot crontab: “/usr/local/bin/example.sh. –cron: crontab: “reboot/* * * * * root /usr/local/bin/example.sh. –cron: uptime: */0 task: “/usr/local/bin/example.sh”. –cron: special_time: reboot job: “/usr/local/bin/example.sh.

When running an Ansible playbook referring to vault‐encruted data files, which parameters can be used to pass the decryption key to ansible‐playbook? (Choose TWO correct answers). ‐‐vault‐password‐file. ‐‐vault‐pass. ‐‐ask‐pass. ‐‐ask‐vault‐pass. ‐‐password‐file.

After a node´s configuration is changed on a Puppet master, how can the node be instructed to apply the new configuration inmediately if the node runs a Puppet agent as a background service?. Run puppet refresh on the node. Run puppet agent –t on the node. Restart the puppet master process. Run puppet master ‐‐distribute on the master. Run puppet agent ‐‐node all ‐‐refresh on the master.

Which of the following expressions are valid Ansible varible names? (Choose TWO correct answers). example_var. examplevar. example‐var. example.var. example var.

Which variable is used in the Ansible inventory file to specify the location of an SSH private key file?. ansible_ssh_private_key_file. ansible_ssh_key_file. ansible_private_key. ansible_private_key_file. ansible_ssh_login_credentials.

Which of the following functions are supported by the ansible copy module? (Choose THREE correct answers). Append texto r data to an existing file. Decompress a file on the target system. Set permissions of a file or directory on the target system. Create a backup of the original target file. Set the owner of a file or directory on the target system.

What Chef Solo?. A special Linux distribution which automatically reverts any change to the system not applied using Chef. A package manger that retrieves software installed using Chef in the generic Chef Menu Format, CMF, instead of using the target. A simplified configuration format for Chef which provides only a subset of the original Chef configuration options. An extensión to Chef to install operating systems on bare metal servers of vitual machines. A tool to use Chef to manage a local system instead os using a distributed chef infrastructure.

Which file contains the global Ansible configuration?. /etc/ansible.conf. /etc/ansible/master.conf. /etc/ansible.d/main.conf. /etc/ansible/ansible.cfg. /etc/ansible/all.vars.

Which criteria can packet filtering firewalls use to permit or suppress traffic? (Choose TWO correct answers). IP addresses. TCP and UDP ports. HTTP Cookies. Common Names in X.509 certificates. Object IDs in REST URLs.

Consider the following log message: Jun 30 00:36:49 headnode clustermanager{12353}: new node 198.51.100.103 This log message is processed by the following Logstash filter: Grok { Match => { “message”, “%{SYSLOGBASE} new node %{IPORHOST:node}” } } Which of the variables below are contained in the resulting event object? (Choose TWO correct answers). node. grok. SYSLOGBASE. IPORHOST. message.

What has to be done to configure Filebeat to submit log information to Logstash? ( Choose TWO correct answers). Replace the input section of the Logstash configuration by a filebeat section. Ad dan output.logstash section to the Filebeat configuration and specify the Logstash server in that section´s hosts attribute. Install Filebeat on the Logstash server and allow the Linux user running the Filebeat daemon to login to the remote host via SSH without using a password. Add a beats section to the input section of the Logstash configuration. Add the IP address of the Filebeat node to the option accept option in the section acl of the Logstash input configuration.

What happens if a grok filter in Logstash processes a log message which dose not match the pattern in the filter´s match property?. The message is passed to the unparseable output and no other filters are applied to it. The message is truncated to those parts which have been matched by the filters. The message is dropped and no other filters are applied to it. The message is kept unchanged and no other filters are applied to it. The message is flagged with the _grokparsefailure tag.

What King of data is provided to Prometheus by a monitored service?. The monitored service provides metric values for keys defined in Prometheus´ monitoring schema. The monitored service provides one metric value which replaces the former calue of the service´s register in Prometheus. The monitored service provides a status in terms of one of three well defined service states. The monitored servide provides an interface which Prometheus queries for the value of a specific metric key. The monitored service provides arbitrary pairs of keys and metric values which are scraped by Prometheus.

What is the default URL Prometheus tries to retrieve from a target when gathering monitoring information? (Specify the Full URL, without any host name or scheme).

Which of the following best practices help to handle large amounts of log data when using the Elastic Stack for log management? ( Choose THREE correct answers). Exclude obviously meaningless log data from log processing as early as possible. Disable logging generally and only enable it in case of failures or errors. Disable logging for all services and components which are externally monitored. Frequently rotate log son their origin systems and delete logs that were shipped to Logstash. Leverage Elasticsearch indexes for the deletion of expired log data.

Which of the following scenarios describes SSL offloading?. Requests which arrive in plain text via HHTP are redirected to HTTPS URLs to enforce encryption. To use HTTPS for multiple hosts in the same domain, a wildcard certificate is use don all nodes hosting the services. Requests which arrive encrypted via HTTPS are answered with redirects to HTTP URLs to improve performance. Incoming HTTPS connections are received by a load balancer which handles the encryption and passes decrypted requests on backend servers. The main content of a website is delivered using HTTPS, assets such as images or scripts are delivered using HTTP.

When can an SQL injection attack happen?. When strings of arbitrary length are passed to a database so they can exceed the kength of data type or data field. When characters or string received from an external source are passed unchanged to a database so they can include SQL. When SQL statemens are stored as database content and might be returned unchanged to a client querying the database. When database queries of an application are redirected to another server which then receives confidential information and might return manipulated data. When an API which causes writes to the database can be triggered remotely without rate limits or other restrictions.

Which git command restores changes that were saved using git stash save?. git stash merge. git stash revert. git stash pop. git stash restore. git stash commit.

What the benefit of feature toggles? (Choose TWO correct answares). Feature toggles decouple technical deployments from the oficial launch of a product. Feature toggles reduce the build time by excluiding unnecessary features from a build. Feature toggles eliminate the need for feature branches in an SCM during development. Feature toggles start microservices on demand when their functionality is requested. Feature toggles can enable new features for advanced users before globally releasing them.

The following output is generated by git branch: development mater production *staging How can all changes from the development branch be integrated into the staging branch?. git stash development. git merge development. git branch ‐‐merge development. git merge delopment..staging. git cp ‐‐merge development.

Where should a Jenkinsfile describing a build pipeline be located?. In the Jenkins folder next to the workspace directory. At the top level of the SCM repository being build. As build artifact in the default artifact store associated with the respective Jenkins proyect. In an SCM dedicated repository dedicated to hold Jenkins configuration files. On a web server with an HTTP URL Jenkins can Access.

Where should containerized applications store persistent data such as user uploaded files or billing information? (choose TWO correct answers). In files inside the container that are exclusively locked by the application. In memory with an API to download a serialized dump of the data. In external systems such as databases or object stores. In dedicated, well known directory tres within the container. In database server which is installed within the container.

Which of the following values could be used in the option config.vm.provision within a Vagrant configuration file?. :rsync, remote: “root@localhost:/”. :extract, file: “root‐fs.tgz”. :shell, path: “install.sh”. :clone, template: “master‐vm”. :boot, iso: "debian-8.iso".

Denunciar Test