<< Prev Question Next Question >>

Question 17/73

Which two statements about Infrastructure as Code are true? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (73q)
Question 1: Which two elements help to secure your API keys? (Choose two...
Question 2: AppDynamics is being used to monitor your distributed Python...
Question 3: An IT department needs to deploy a new application named 'En...
Question 4: What are two advantages of using Configuration Management To...
Question 5: Which two actions help limit the attack surface of your Dock...
Question 6: When DevOps practices are integrated into an existing organi...
Question 7: Refer to the exhibit. (Exhibit) A development team is design...
Question 8: A user wants to deploy a new service to a Kubernetes cluster...
Question 9: (Exhibit) Refer to the exhibit. A developer needs to scale t...
Question 10: An application is being built to collect and display telemet...
Question 11: Which method is a safe way to provide a username/password co...
Question 12: Refer to the exhibit. (Exhibit) A distributed application co...
Question 13: A three-tier web application must be moved to containers. A ...
Question 14: A team must roll out updates on the production instance of a...
Question 15: Refer to the exhibit. (Exhibit) A Python script implements a...
Question 16: What is as responsibility for teams running private cloud se...
Question 17: Which two statements about Infrastructure as Code are true? ...
Question 18: How does eliminating hardcoded or default passwords help to ...
Question 19: A CI/CD pipeline that builds infrastructure components using...
Question 20: A developer must create a GitLab CI/CD pipeline with these r...
Question 21: Which Docker command is used to start an interactive Bash sh...
Question 22: A DevOps engineer has built a new container and must open po...
Question 23: AppDynamics is being used to monitor your distributed Python...
Question 24: Which interface is most commonly used to integrate logging, ...
Question 25: What is the purpose of using a build tool in software develo...
Question 26: Microservices architecture pattern has been applied and the ...
Question 27: A DevOps engineer has built a container to host a web-server...
Question 28: A DevOps engineering wants to build an application implement...
Question 29: A DevOps engineering wants to build an application implement...
Question 30: (Exhibit) Refer to the exhibit. The exhibit shows the output...
Question 31: DRAG DROP Construct an Ansible script to gather information ...
Question 32: What are two benefits of Infrastructure as Code? (Choose two...
Question 33: A development team uses Kubernetes for application developme...
Question 34: An application is being built to collect and display telemet...
Question 35: (Exhibit) Drag and drop the scenarios from the left onto the...
Question 36: Fill in the blank to complete the statement. A user wants a ...
Question 37: The IaC configuration for an application is being deployed u...
Question 38: (Exhibit) Refer to the exhibit. A developer is creating a he...
Question 39: Which step must be taken to enable centralized logging in a ...
Question 40: Fill in the blanks to complete the statement. When creating ...
Question 41: ConfigMap keys have been mapped to different file names usin...
Question 42: Configuration changes to the production network devices are ...
Question 43: An interface on a router as a Layer 3 link has been configur...
Question 44: Refer to the exhibit. (Exhibit) How does the architecture re...
Question 45: A DevOps engineer is supporting a containerized application ...
Question 46: How does eliminating hardcoded or default passwords help to ...
Question 47: A DevOps engineering wants to build an application implement...
Question 48: A developer has created a deployment that should launch a po...
Question 49: Which two statements about Infrastructure as Code are true? ...
Question 50: (Exhibit) Refer to the exhibit. What is the user doing with ...
Question 51: How does eliminating hardcoded or default passwords help to ...
Question 52: A developer is creating an application based on microservice...
Question 53: Refer to the exhibit. (Exhibit) A developer needs to scale t...
Question 54: Fill in the blanks to complete the line of Python code that ...
Question 55: - A developer is creating an application where each service ...
Question 56: The E-commerce application is being monitored using AppDynam...
Question 57: A developer wants to deploy a highly available web server cl...
Question 58: What are two advantages of using Configuration Management To...
Question 59: Which two practices help make the security of an application...
Question 60: What is the purpose of using sysprep when developing a Micro...
Question 61: Which two characteristics of a build tool that is used in an...
Question 62: A CI/CD pipeline that builds infrastructure components using...
Question 63: Refer to the exhibit. (Exhibit) A developer needs to scale t...
Question 64: (Exhibit) Refer to the exhibit. A containerized application ...
Question 65: A new banking application is being developed as the main cur...
Question 66: A DevOps engineer is designing a precheck validation of the ...
Question 67: An IT team plans to deploy a new service built on top of an ...
Question 68: What is a capability of node-level logging in Kubernetes?...
Question 69: A DevOps engineer has built a new container and must open po...
Question 70: Which method is a safe way to provide a username/password co...
Question 71: Drag and drop the commands from the bottom onto the correct ...
Question 72: Refer to the exhibit. (Exhibit) What is the user doing with ...
Question 73: ConfigMap keys have been mapped to different file names usin...