<< Prev Question Next Question >>

Question 16/20

Pipelines often require access to protected resources such as servers, databases, and SCMs. Without using an external credentials manager, which of the following provides the most secure centralized mechanism for managing the "secrets" that Jenkins requires to login/authenticate (for example: keys, tokens, passwords)?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (20q)
Question 1: When you want to validate that your software produces the de...
Question 2: Which arc true when installing new plugins? Choose 2 answers...
Question 3: Which can be defined in and limited to a specific folder and...
Question 4: What is the preferred method for a Jenkins administrator to ...
Question 5: Which statements about a Distributed Version Control System ...
Question 6: Which are benefits of binary reuse (compiling once and reusi...
Question 7: Which of the following are true about the structure of a Dec...
Question 8: What is the default directory where a build takes place?...
Question 9: Which are commonly referenced as key points of CI? Choose 3 ...
Question 10: Which of the following are advantages of a Pipeline job when...
Question 11: A freestyle job is set up to "Enable concurrent builds if ne...
Question 12: In Jenkins, which section in a Freestyle job configuration i...
Question 13: A multi-configuration job contains the combination filter in...
Question 14: Which job type Is always available In Jenkins without additi...
Question 15: A Freestyle job has the configuration shown here: (Exhibit) ...
Question 16: Pipelines often require access to protected resources such a...
Question 17: Which are Source Code Management tools? Choose 3 answers...
Question 18: Yon are an administrator of a base Jenkins master with the r...
Question 19: When you upgrade a plugin and find an issue in the new versi...
Question 20: In Jenkins, a trigger commonly refers to a mechanism that au...