300-910 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the 300-910 certification exam? Kickstart your success with our 300-910 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with 300-910 practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free 300-910 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
What is chaos engineering?
A. designing an application with fuzzy logic that makes it hard to predict
B. a product engineering approach that lacks a formal methodology
C. splitting a project between teams that do not communicate with each other
D. introducing problems into a system to study behavior and improve reliability
Refer to the exhibit. What are the properties of the load balancer in a Kubernetes environment?
A. Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1
B. Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port
C. Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp
D. Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp
AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)
A. node
B. app
C. agent
D. tier
E. event
Refer to the exhibit. What is the reason for this error message?
A. The required dependencies for the urllib3 module are not installed.
B. The requests module is not installed.
C. The required dependencies for the requests module are not installed.
D. The site-packages directory has been corrupted.
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?
A. cost
B. metrics and monitoring
C. hardware maintenance
D. credentials management
Which approach must be used to integrate DevOps practices into the team structure in an existing organization?
A. Create a team that can deliver all the stages with active cooperation between the team members
B. Create a team that can deliver all the stages with well-defined roles and a communication structure between team members
C. Create a team for each stage with structured communication channels
D. Create a team for each stage with active cooperation between the teams
Refer to the exhibit. How does the architecture respond to a usage spike?
A. The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly
B. The database prioritizes quick and immediate queries over complicated ones to reduce the request queue
C. The Orchestrator increases the resources assigned to containers to increase performance
D. The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests
A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires: • the CI/CD pipeline to spin up test instances. • instances must be used to validate changes. • changes must be validated prior to a continuous deployment workflow, and • then push the changes to production How should the pipeline target the required environment?
A. Use separate CI servers for each environment
B. Use different pipelines for each environment
C. Use separate Git repositories for each environment
D. Use different inventory files for each environment
Which description of a canary deployment is true?
A. deployment by accident
B. deployment that is rolled back automatically after a configurable amount of minutes
C. deployment relating to data mining development
D. deployment to a limited set of servers or users
What are two reasons a Docker golden image should be updated? (Choose two.)
A. when there is a change to a username or password in the Docker secrets
B. when the application has a new release
C. when a fix for a security vulnerability is released
D. when a change is needed to an environment variable in the Dockerfile
E. when the base image is nearing the end of life
What is the impact of using the Drone.io CI/CD tool on the local installation step?
A. slows down the development
B. delays the deployment of components
C. speeds up the procedure
D. complicates the application process
An IT team plans to deploy a new service built on top of an existing service. The capacity needed for the new service is difficult to estimate because the demand for the new service is undetermined. The team has these deployment requirements: • A subset of the users of the original service must be migrated to the new service based on their profile • The new service must be rolled back easily if capacity exceeds estimates Which deployment strategy must be used?
A. rolling
B. blue/green
C. geolocation
D. canary
When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)
A. mean time between success
B. mean time to recover
C. cone testing
D. change lead time
E. age of codebase
What is an advantage of using configuration management tools to automate infrastructure services?
A. eliminates the need to run integration tests within the CI/CD pipeline
B. provides high native monitoring of services
C. eliminates the need for CI/CD tools
D. integrates with container orchestration
Which Kubernetes object ensures that each node is limited to running no more than one pod?
A. UniCast
B. Deployment
C. DaemonSet
D. ReplicaSet
Refer to the exhibit. A docker-compose.yml file implements a postgres database container. Which .gitlab-ci.yml code block checks the health status of the container and stops the pipeline if the container is unhealthy?
A.
B.
C.
D.
To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?
A. Configure a new JSON object in Kibana.
B. Create a search index in Logstash.
C. Create an index pattern in Kibana.
D. Create a time filter on Kibana to look at time only.
A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network. If an attacker gains access to the scripts, what is the risk exposure?
A. The Automation server is at risk of being compromised.
B. The Ansible scripts run through encrypted SSH connections.
C. The internal network is at risk of being compromised.
D. The entire CI/CD-related infrastructure is at risk.
What is a practice of infrastructure as code?
A. Use multiple version control systems
B. Document as much as possible
C. Configure the deployment consistently
D. Test, integrate, and deploy once a day
Refer to the exhibit. What is causing the requests code to fail?
A. Rython3 is not compatible with requests.
B. The requests library is not imported.
C. The requests library is not installed.
D. The requests coming into stdin fail because device_ip cannot be parsed.
DRAG DROP - Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.
Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)
A. It runs unit tests against code that is committed.
B. It builds your software on the production environment.
C. It builds your software when changes are committed.
D. It builds your software every 500 milliseconds.
E. It must have a plug-in for Puppet and Maven.
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?
A. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.
B. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.
C. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.
D. A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.
What are two benefits of Infrastructure as Code? (Choose two.)
A. It enables continuous integration.
B. It allows for management control.
C. It ensures consistency.
D. It improves application monitoring.
E. It reduces risk.
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not start. Why did the pipeline fail to start?
A. The CI server was not configured as a Git remote for the repository.
B. The webhook call from the code repository did not reach the CI server.
C. Configuration changes must be sent to the pipeline, which then updates the repository.
D. The pipeline must be started manually after the code repository is updated.
A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible. Which approach accomplishes this goal?
A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications
B. Use the same passwords across the entire CI/CD pipeline
C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline
D. Never use one-time passwords in CI/CD pipeline
Refer to the exhibit. The push_configs.yml playbook returns the error shown. Which action resolves the error?
A. Install the Paramiko library on the host that runs Ansible
B. Generate a new SSH key pair and add the public key to the target machine
C. Export the ANSIBLE_HOST_KEY_CHECKING=False variable
D. Comment out the StrictHostKeyChecking=yes line from ansible.cfg
Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)
A. Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.
B. Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.
C. Use only software modules that are written by the internal team.
D. Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.
E. Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.
Refer to the exhibit. A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?
A. The CI/CD system is configured incorrectly to import the dependencies to the code
B. The code is pushed incorrectly to the CI/CD system
C. The version of Python is wrong in the CI/CD pipeline
D. The CI/CD system is configured incorrectly to download the required dependencies
Which two statements about Infrastructure as Code are true? (Choose two.)
A. Test-driven development practices make use of Infrastructure as Code.
B. Infrastructure as Code refers to automated testing libraries.
C. DevOps builds upon Infrastructure as Code.
D. Infrastructure as Code is based on practices from software development.
E. Infrastructure as Code must use the same programming language as the application.
DRAG DROP -Refer to the exhibit. A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented. Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.
What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?
A. prepares a new host to accept a hard drive image built on another machine
B. removes all host-specific information and components from the local machine
C. installs all the latest security patches and OS updates to the local machine
D. writes the local hard drive image to an ISO file that can be deployed to another machine
DRAG DROP - Drag and drop the steps in Gartner's public cloud cost management framework from the left into the order on the right.
Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using TDD?
A. soak testing
B. unit testing
C. load testing
D. volume testing
What is a capability of node-level logging in Kubernetes?
A. Using the Kubernetes JSON logging driver enables log persistence
B. Output that is written to stdin is retrieved by using kubectl
C. Output that is written to stderr is not logged or retrievable by using kubectl
D. Using the local logging driver of Docker enables log persistence
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?
A. encode the value with base64 in a secure DNS CTEXT entry
B. as an environment variable in the Dockerfile
C. Docker environment variable
D. Docker secrets
A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of "Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment. Which Kubernetes command confirms that the service is running and usable?
A. kubectl -n Cisco get services | grep “Cisco-DB”
B. kubectl -n Cisco get pods | grep “Cisco-DB”
C. kubectl get pods | grep “Cisco-DB”
D. kubectl -n Cisco get service | grep “Cisco-DB”
A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver. In which file should the name of the middleware server be configured?
A. Docker Service discovery daemon
B. Docker Swarm
C. Docker Compose
D. Dynamic Host Configuration Protocol
What is the effective way to manage computing costs in a public cloud?
A. Monitor data transfers to minimize cost.
B. Use dedicated hardware for all instances.
C. Select the largest instance option available in order to pay for only one instance.
D. Make use of elastic services and scale on demand.
Refer to the exhibit. A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?
A. ReplicaSet
B. PriorityClass
C. Deployment
D. Pod
DRAG DROP - A developer is creating an application where each service uses a different operating system. The application components need to be isolated but must have the ability to communicate with each other. Drag and drop the entries from the left into the order on the right to create a Dockerfile that will accomplish this goal.
When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?
A. Add a step to run the debug ip routing command before the change, and add a step after the change to issue the no debug ip routing command.
B. Add a step to capture the routing table before the change, and add a step after the change to capture it again. Calculate the difference between the two for review.
C. Add a step to ping a host on each of the static routes before the change, and a step after to repeat the same check. Calculate the difference between the two checks for review.
D. Add a step to run the same playbook again with the debug option enabled and use grep on the log output to ensure that the commands are not applied again.
Refer to the exhibit. Which action allows the development team to reach the deployed application?
A. Create an init container to initialize routes for the containers in the pod
B. Create a service to expose the logic running in the pod
C. Delete the deployment and redeploy by using a ReplicaSet.
D. Delete the deployment and redeploy by using the latest tag for the container image
An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a RADIUS server will be used with authorized user groups. Which action must be used to prevent developers from accidentally committing secrets in the code?
A. Add a unit test to block the secrets
B. Add a precommit Git hook to block the secrets
C. Add dast to the repository to block the secrets
D. Add a job in the CI build to block the secrets
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?
A. Dynamic Application Security Testing
B. Runtime Application Health-Protection
C. Continuous Application Security Testing
D. Static Analysis Security Testing
Refer to the exhibit. What is the user doing with Drone in this automated test?
A. testing Alpine Linux versus Ubuntu Linux
B. testing a PostgreSQL DB against multiple architectures
C. testing only the amd64 architecture
D. testing PostgreSQL deployment in an Alpine Linux VM
What are two advantages of using Configuration Management Tools? (Choose two.)
A. reduction in policy violations caused by human errors
B. reduction in administration costs
C. reduction in network changes already performed automatically
D. reduction of on-premises networking equipment
E. reduction in networking team skills
A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience. Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)
A. application feature sprawl
B. CPU peak usage
C. CPU average usage
D. microservices count
E. CPU frequency
Which Kubernetes object is used to create a ClusterIP or NodePort?
A. service
B. pod
C. deployment
D. loadbalancer
Refer to the exhibit. The exhibit shows the output of an Ansible task that prints the contents of the show_ip_int_brief variable that was registered in a different task in the playbook. Which expression is used to print the output of the command without its header row?
A. show_ip_int_brief[“Ëœstdout_lines’][0]
B. show_ip_int_brief[“Ëœstdout_lines’][1:]
C. show_ip_int_brief[“Ëœstdout_lines’][0][1:]
D. show_ip_int_brief[“Ëœstdout_lines’]
Free Access Full 300-910 Practice Questions Free
Want more hands-on practice? Click here to access the full bank of 300-910 practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your 300-910 certification journey!