Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following statements is true about load balancers?

A.

Load balancers are a security risk because they obfuscate the origin of connections.

B.

Load balancer help to improve the availability and scalability of a service.

C.

Load balancers are a single point of failure because they cannot be deployed redundantly.

D.

Load balancer require access to private keys in order to be able to forward HTTPS traffic.

E.

Load balancers cannot use connection content, such as HTTP cookies, to route traffic.

Which of the following tasks are completed by docker-compose down when it is used with additional parameters? (Choose two correct answers.)

A.

Delete all volumes defined in the composer file.

B.

Delete all containers defined in the composer file.

C.

Delete all networks defined in the composer file.

D.

Delete all images used in the composer file from the Docker nodes.

E.

Delete all images built from the composer file from their registry.

Which security issues exist for most publicly available Vagrant boxes? (Choose three correct answers.)

A.

They accept SSH logins from the user vagrant with the password vagrant.

B.

They accept SSH logins from the user vagrant with a publicly available SSH key pair.

C.

The vagrant user can use sudo to obtain root privileges without additional authentication.

D.

Their whole file system, including configuration files, is writable by any user, including vagrant.

E.

They export their file system via NFS with full write permissions without any additional restrictions.

Which docker subcommand starts a new container? (Specify only the subcommand without any path or parameters.)

What is the Puppet equivalent to an Ansible Playbook called?

A.

A Puppet Catalog

B.

A Puppet Playbook

C.

A Puppet Factsheet

D.

A Puppet Declaration

E.

A Puppet Manifest

Which of the following functions are provided by the Ansible apt module? (Choose two correct answers.)

A.

Update an installed package to the latest version.

B.

Update the list of available packages from configured repositories.

C.

Re-compile an installed package from the source code.

D.

Add the URL of a new repository to the package manager configuration.

E.

Install a dpkg based Linux distribution on an empty target system.

How is cloud-init integrated with a managed system image?

A.

cloud-init provides the cloud-init-worker command which has to be invoked periodically within the running instance.

B.

cloud-init provides systemd units which must be included in several stages of the booting process of the instance.

C.

cloud-init provides its own startup mechanism which replaces the instance’s original init system, such as systemd.

D.

cloud-init provides a Linux kernel module that must be included and loaded in the instance’s initramfs.

E.

cloud-init provides the cloud-init-daemon service which is launched during startup and keeps the instance in sync with the desired configuration.

Which of the following goals are favored by agile software development methodologies? (Choose two correct answers.)

A.

Self-organization of teams.

B.

Central governance and control.

C.

Flexibility of processes.

D.

Absolute planning adherence.

E.

Long-term release and feature management.

What statement is true regarding the Swarm service created by the following command?

docker service create --name myweb --network webnet --mode global nginx

A.

It runs exactly one time in the Swarm and cannot be scaled.

B.

It runs exactly once on each node in a Swarm.

C.

It runs on one node by default and can be scaled to an arbitrary number of replicas.

D.

It runs on all nodes which provide the network webnet.

E.

It runs only on those nodes which support the network type global.

The following command is issued on two docker nodes:

docker network create --driver bridge isolated_nw

Afterwards, one container is started at each node with the parameter --network=isolated_nw. It turns out that the containers can not interact with each other. What must be done in order to allow the containers to interact with each other? (Choose two correct answers.)

A.

Use a host network instead of a bridged network.

B.

Add the option --inter-container to the docker network create command.

C.

Start the containers on the same node.

D.

Change the --network parameter of docker create to --network=isolated_nw,nofence.

E.

Use an overlay network instead of a bridged network.