Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two benefits of Infrastructure as Code? (Choose two.)

A.

It enables continuous integration.

B.

It allows for management control.

C.

It ensures consistency.

D.

It improves application monitoring.

E.

It reduces risk.

What are two reasons a Docker golden image should be updated? (Choose two.)

A.

when there is a change to a username or password in the Docker secrets

B.

when the application has a new release

C.

when a fix for a security vulnerability is released

D.

when a change is needed to an environment variable in the Dockerfile

E.

when the base image is nearing the end of life

Refer to the exhibit.

A distributed application contains data services that connect to databases via JDBC and to other remote services via HTTP. The overall response time is too long, and AppDynamics is used to investigate the root cause. From the application flow map, a specific data service running on Docker has been identified whose response time is over 10 seconds.

Which action resolves the issue?

A.

Change from a JDBC call to a HTTP call to retrieve data faster

B.

Run the AccountProfileMySQL service in Kubernetes

C.

Explore the JDBC queries looking for optimization opportunities

D.

Verify if the Docker container running MySQL is limiting CPU utilization

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

A.

All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B.

All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C.

All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D.

A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A.

Dynamic Application Security Testing

B.

Runtime Application Health-Protection

C.

Continuous Application Security Testing

D.

Static Analysis Security Testing

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)

A.

node

B.

app

C.

agent

D.

tier

E.

event

What is the impact of using the Drone.io CI/CD tool on the local installation step?

A.

slows down the development

B.

delays the deployment of components

C.

speeds up the procedure

D.

complicates the application process

Which Dockerfile produces an efficient image rebuild when the exposed port Python dependency, or MyApp source code is modified?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.

Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.

A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should be the developer address? (Choose two.)

A.

performing code reviews

B.

requirement gathering

C.

change management process

D.

new code scanning

E.

rollback plans