Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

300-910 Practice Questions Free

Table of Contents

Toggle
  • 300-910 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full 300-910 Practice Questions Free

300-910 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the 300-910 certification exam? Kickstart your success with our 300-910 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with 300-910 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free 300-910 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

What is chaos engineering?

A. designing an application with fuzzy logic that makes it hard to predict

B. a product engineering approach that lacks a formal methodology

C. splitting a project between teams that do not communicate with each other

D. introducing problems into a system to study behavior and improve reliability

 


Suggested Answer: D

 

Question 2

Image
Refer to the exhibit. What are the properties of the load balancer in a Kubernetes environment?

A. Has exposed ports 80 and 8080 to a private IP address and directs outgoing connections to the port named http-port1

B. Has exposed ports 80 and 8080 to a public IP address and directs incoming connections to the port named nginx-port

C. Forwards incoming traffic from the port named nginx-port to ports 80 and 8080 of nginxapp

D. Forwards any outgoing traffic from the port named nginx-port to exposed ports http-port1 and http-port2 of nginxapp

 


Suggested Answer: B

 

Question 3

AppDynamics is being used to monitor your distributed Python application. Each individual container of the application is instrumented with an AppD agent. Which two configuration variables uniquely determine the module being monitored? (Choose two.)

A. node

B. app

C. agent

D. tier

E. event

 


Suggested Answer: AB

 

Question 4

Image
Refer to the exhibit. What is the reason for this error message?

A. The required dependencies for the urllib3 module are not installed.

B. The requests module is not installed.

C. The required dependencies for the requests module are not installed.

D. The site-packages directory has been corrupted.

 


Suggested Answer: B

 

Question 5

What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?

A. cost

B. metrics and monitoring

C. hardware maintenance

D. credentials management

 


Suggested Answer: D

 

Question 6

Which approach must be used to integrate DevOps practices into the team structure in an existing organization?

A. Create a team that can deliver all the stages with active cooperation between the team members

B. Create a team that can deliver all the stages with well-defined roles and a communication structure between team members

C. Create a team for each stage with structured communication channels

D. Create a team for each stage with active cooperation between the teams

 


Suggested Answer: A

 

Question 7

Image
Refer to the exhibit. How does the architecture respond to a usage spike?

A. The monitoring software instructs the Orchestrator to increase the count of containers and to configure the load balancer accordingly

B. The database prioritizes quick and immediate queries over complicated ones to reduce the request queue

C. The Orchestrator increases the resources assigned to containers to increase performance

D. The load balancer interacts with the Orchestrator to optimize the balancing algorithm to match the incoming flow of requests

 


Suggested Answer: D

 

Question 8

A precheck validation is being designed for the network state in a Cl/CD pipeline This design requires:
•	the CI/CD pipeline to spin up test instances.
•	instances must be used to validate changes.
•	changes must be validated prior to a continuous deployment workflow, and
•	then push the changes to production
How should the pipeline target the required environment?

A. Use separate CI servers for each environment

B. Use different pipelines for each environment

C. Use separate Git repositories for each environment

D. Use different inventory files for each environment

 


Suggested Answer: D

 

Question 9

Which description of a canary deployment is true?

A. deployment by accident

B. deployment that is rolled back automatically after a configurable amount of minutes

C. deployment relating to data mining development

D. deployment to a limited set of servers or users

 


Suggested Answer: D

 

Question 10

What are two reasons a Docker golden image should be updated? (Choose two.)

A. when there is a change to a username or password in the Docker secrets

B. when the application has a new release

C. when a fix for a security vulnerability is released

D. when a change is needed to an environment variable in the Dockerfile

E. when the base image is nearing the end of life

 


Suggested Answer: BC

 

Question 11

What is the impact of using the Drone.io CI/CD tool on the local installation step?

A. slows down the development

B. delays the deployment of components

C. speeds up the procedure

D. complicates the application process

 


Suggested Answer: C

 

Question 12

An IT team plans to deploy a new service built on top of an existing service. The capacity needed for the new service is difficult to estimate because the demand for the new service is undetermined. The team has these deployment requirements:
•	A subset of the users of the original service must be migrated to the new service based on their profile
•	The new service must be rolled back easily if capacity exceeds estimates
Which deployment strategy must be used?

A. rolling

B. blue/green

C. geolocation

D. canary

 


Suggested Answer: D

 

Question 13

When DevOps practices are integrated into an existing organization, which two characteristics are positive indicators of DevOps maturity? (Choose two.)

A. mean time between success

B. mean time to recover

C. cone testing

D. change lead time

E. age of codebase

 


Suggested Answer: BD

 

Question 14

What is an advantage of using configuration management tools to automate infrastructure services?

A. eliminates the need to run integration tests within the CI/CD pipeline

B. provides high native monitoring of services

C. eliminates the need for CI/CD tools

D. integrates with container orchestration

 


Suggested Answer: C

 

Question 15

Which Kubernetes object ensures that each node is limited to running no more than one pod?

A. UniCast

B. Deployment

C. DaemonSet

D. ReplicaSet

 


Suggested Answer: C

 

Question 16

Image
Refer to the exhibit. A docker-compose.yml file implements a postgres database container.
Which .gitlab-ci.yml code block checks the health status of the container and stops the pipeline if the container is unhealthy?

A.
Image

B.
Image

C.
Image

D.
Image

 


Suggested Answer: C

 

Question 17

To make logging searches more efficient and useful in Kibana, an Administrator wants to implement index patterns around the hostname of some software systems. Where should this be configured?

A. Configure a new JSON object in Kibana.

B. Create a search index in Logstash.

C. Create an index pattern in Kibana.

D. Create a time filter on Kibana to look at time only.

 


Suggested Answer: C

 

Question 18

A security team is running vulnerability scans against a CI/CD pipeline. The reports show that RDBMS secrets were found hardcoded in Ansible scripts. The RDBMS resides in the internal network but is accessible from a jump server that resides in a public network.
If an attacker gains access to the scripts, what is the risk exposure?

A. The Automation server is at risk of being compromised.

B. The Ansible scripts run through encrypted SSH connections.

C. The internal network is at risk of being compromised.

D. The entire CI/CD-related infrastructure is at risk.

 


Suggested Answer: D

 

Question 19

What is a practice of infrastructure as code?

A. Use multiple version control systems

B. Document as much as possible

C. Configure the deployment consistently

D. Test, integrate, and deploy once a day

 


Suggested Answer: C

 

Question 20

Image
Refer to the exhibit. What is causing the requests code to fail?

A. Rython3 is not compatible with requests.

B. The requests library is not imported.

C. The requests library is not installed.

D. The requests coming into stdin fail because device_ip cannot be parsed.

 


Suggested Answer: B

 

Question 21

DRAG DROP
-
Drag and drop the code from the bottom onto the box where the code is missing to post a message to a Cisco Webex space. Not all options are used.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 22

Which two characteristics of a build tool that is used in an automated build pipeline? (Choose two.)

A. It runs unit tests against code that is committed.

B. It builds your software on the production environment.

C. It builds your software when changes are committed.

D. It builds your software every 500 milliseconds.

E. It must have a plug-in for Puppet and Maven.

 


Suggested Answer: AC

 

Question 23

How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats?

A. All devices that generate syslogs must use agents that process the local logs and transmit them in a specific format to the ELK Stack.

B. All logs are stored in their unstructured text format, and the ELK Stack performs data analysis by intelligently parsing the logs using machine learning algorithms.

C. All different message formats are parsed separately using custom filters, and the resulting structured data is stored for later analysis.

D. A single, comprehensive log format is defined on the ELK Stack. All incoming logs, regardless of format, are transformed to match the comprehensive format, and only applicable fields are populated.

 


Suggested Answer: D

 

Question 24

What are two benefits of Infrastructure as Code? (Choose two.)

A. It enables continuous integration.

B. It allows for management control.

C. It ensures consistency.

D. It improves application monitoring.

E. It reduces risk.

 


Suggested Answer: CE

 

Question 25

Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI tool are running on separate servers.
Some configuration changes are pushed to the code repository, but the pipeline did not start.
Why did the pipeline fail to start?

A. The CI server was not configured as a Git remote for the repository.

B. The webhook call from the code repository did not reach the CI server.

C. Configuration changes must be sent to the pipeline, which then updates the repository.

D. The pipeline must be started manually after the code repository is updated.

 


Suggested Answer: C

 

Question 26

A new banking application is being developed as the main currency exchange resource for all the customers on a global scale. The application must comply with the security based on the deployed region. Therefore, the CI/CD pipeline must be created with the highest security possible.
Which approach accomplishes this goal?

A. Give the accounts used in the CI/CD pipeline full administrative rights to all applications

B. Use the same passwords across the entire CI/CD pipeline

C. Ensure that secrets are not inadvertently passed on during builds for pull requests via CI/CD pipeline

D. Never use one-time passwords in CI/CD pipeline

 


Suggested Answer: C

 

Question 27

Image
Refer to the exhibit. The push_configs.yml playbook returns the error shown.
Which action resolves the error?

A. Install the Paramiko library on the host that runs Ansible

B. Generate a new SSH key pair and add the public key to the target machine

C. Export the ANSIBLE_HOST_KEY_CHECKING=False variable

D. Comment out the StrictHostKeyChecking=yes line from ansible.cfg

 


Suggested Answer: C

 

Question 28

Which two practices help make the security of an application a more integral part of the software development lifecycle? (Choose two.)

A. Add a step to the CI/CD pipeline that runs a dynamic code analysis tool during the pipeline execution.

B. Add a step to the CI/CD pipeline that runs a static code analysis tool during the pipeline execution.

C. Use only software modules that are written by the internal team.

D. Add a step to the CI/CD pipeline to modify the release plan so that updated versions of the software are made available more often.

E. Ensure that the code repository server has enabled drive encryption and stores the keys on a Trusted Platform Module or Hardware Security Module.

 


Suggested Answer: AE

 

Question 29

Image
Refer to the exhibit. A developer is creating a script to test APIs. The Cisco Webex API and a CI/CD pipeline are tested to ensure that the script runs without problems. The script is executed without issues locally, but the CI/CD system returns the error shown. What is the problem with the script?

A. The CI/CD system is configured incorrectly to import the dependencies to the code

B. The code is pushed incorrectly to the CI/CD system

C. The version of Python is wrong in the CI/CD pipeline

D. The CI/CD system is configured incorrectly to download the required dependencies

 


Suggested Answer: A

 

Question 30

Which two statements about Infrastructure as Code are true? (Choose two.)

A. Test-driven development practices make use of Infrastructure as Code.

B. Infrastructure as Code refers to automated testing libraries.

C. DevOps builds upon Infrastructure as Code.

D. Infrastructure as Code is based on practices from software development.

E. Infrastructure as Code must use the same programming language as the application.

 


Suggested Answer: AD

 

Question 31

DRAG DROP
-
 Image
Refer to the exhibit. A development team is designing an application that will include multiple components and services. To streamline the process, CO/CD must be implemented.
Drag and drop the CI/CD pipeline stages from the left onto the targets on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 32

What is the purpose of using sysprep when developing a Microsoft Windows-based golden image process?

A. prepares a new host to accept a hard drive image built on another machine

B. removes all host-specific information and components from the local machine

C. installs all the latest security patches and OS updates to the local machine

D. writes the local hard drive image to an ISO file that can be deployed to another machine

 


Suggested Answer: B

 

Question 33

DRAG DROP
-
Drag and drop the steps in Gartner's public cloud cost management framework from the left into the order on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 34

Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the source code that were developed using
TDD?

A. soak testing

B. unit testing

C. load testing

D. volume testing

 


Suggested Answer: B

 

Question 35

What is a capability of node-level logging in Kubernetes?

A. Using the Kubernetes JSON logging driver enables log persistence

B. Output that is written to stdin is retrieved by using kubectl

C. Output that is written to stderr is not logged or retrievable by using kubectl

D. Using the local logging driver of Docker enables log persistence

 


Suggested Answer: D

 

Question 36

Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container?

A. encode the value with base64 in a secure DNS CTEXT entry

B. as an environment variable in the Dockerfile

C. Docker environment variable

D. Docker secrets

 


Suggested Answer: D

 

Question 37

A developer has created a deployment that should launch a pod to run their database service. The pod should launch with a metadata name of "Cisco-DB," and the developer has added it to the "Cisco" namespace in their deployment.
Which Kubernetes command confirms that the service is running and usable?

A. kubectl -n Cisco get services | grep “Cisco-DB”

B. kubectl -n Cisco get pods | grep “Cisco-DB”

C. kubectl get pods | grep “Cisco-DB”

D. kubectl -n Cisco get service | grep “Cisco-DB”

 


Suggested Answer: C

 

Question 38

A three-tier web application must be moved to containers. A webserver is already in place, and the middleware container can talk to a central database server. The hostname of the database server is known, but the name of the middleware server must be provided to the webserver.
In which file should the name of the middleware server be configured?

A. Docker Service discovery daemon

B. Docker Swarm

C. Docker Compose

D. Dynamic Host Configuration Protocol

 


Suggested Answer: A

 

Question 39

What is the effective way to manage computing costs in a public cloud?

A. Monitor data transfers to minimize cost.

B. Use dedicated hardware for all instances.

C. Select the largest instance option available in order to pay for only one instance.

D. Make use of elastic services and scale on demand.

 


Suggested Answer: D

 

Question 40

Image
Refer to the exhibit. A developer needs to scale the existing pods within the worked nodes. Which object should be edited to achieve this goal?

A. ReplicaSet

B. PriorityClass

C. Deployment

D. Pod

 


Suggested Answer: A

 

Question 41

DRAG DROP
-
A developer is creating an application where each service uses a different operating system. The application components need to be isolated but must have the ability to communicate with each other.
Drag and drop the entries from the left into the order on the right to create a Dockerfile that will accomplish this goal.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 42

When static routes are added to a router in a network using a CI/CD pipeline, an Ansible playbook is used to make these changes. Which steps must be added to the pipeline to validate that the changes have the intended effect on the traffic flow?

A. Add a step to run the debug ip routing command before the change, and add a step after the change to issue the no debug ip routing command.

B. Add a step to capture the routing table before the change, and add a step after the change to capture it again. Calculate the difference between the two for review.

C. Add a step to ping a host on each of the static routes before the change, and a step after to repeat the same check. Calculate the difference between the two checks for review.

D. Add a step to run the same playbook again with the debug option enabled and use grep on the log output to ensure that the commands are not applied again.

 


Suggested Answer: B

 

Question 43

Image
Refer to the exhibit. Which action allows the development team to reach the deployed application?

A. Create an init container to initialize routes for the containers in the pod

B. Create a service to expose the logic running in the pod

C. Delete the deployment and redeploy by using a ReplicaSet.

D. Delete the deployment and redeploy by using the latest tag for the container image

 


Suggested Answer: B

 

Question 44

An application is being developed to be used by the HR department of a company on a global scale. The application will be used as a central repository for employee contracts. For user access, a
RADIUS server will be used with authorized user groups.
Which action must be used to prevent developers from accidentally committing secrets in the code?

A. Add a unit test to block the secrets

B. Add a precommit Git hook to block the secrets

C. Add dast to the repository to block the secrets

D. Add a job in the CI build to block the secrets

 


Suggested Answer: A

 

Question 45

Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable?

A. Dynamic Application Security Testing

B. Runtime Application Health-Protection

C. Continuous Application Security Testing

D. Static Analysis Security Testing

 


Suggested Answer: D

 

Question 46

Image
Refer to the exhibit. What is the user doing with Drone in this automated test?

A. testing Alpine Linux versus Ubuntu Linux

B. testing a PostgreSQL DB against multiple architectures

C. testing only the amd64 architecture

D. testing PostgreSQL deployment in an Alpine Linux VM

 


Suggested Answer: D

 

Question 47

What are two advantages of using Configuration Management Tools? (Choose two.)

A. reduction in policy violations caused by human errors

B. reduction in administration costs

C. reduction in network changes already performed automatically

D. reduction of on-premises networking equipment

E. reduction in networking team skills

 


Suggested Answer: BC

 

Question 48

A company has experienced serious growth and the hosted applications are getting more and more hits. Based on the increased work load, applications have started to show signs of reduced performance, which is affecting the user experience.
Which two server metrics should be tracked to ensure that the customer experience remains within acceptable limits? (Choose two.)

A. application feature sprawl

B. CPU peak usage

C. CPU average usage

D. microservices count

E. CPU frequency

 


Suggested Answer: BC

 

Question 49

Which Kubernetes object is used to create a ClusterIP or NodePort?

A. service

B. pod

C. deployment

D. loadbalancer

 


Suggested Answer: A

 

Question 50

Image
Refer to the exhibit. The exhibit shows the output of an Ansible task that prints the contents of the show_ip_int_brief variable that was registered in a different task in the playbook.
Which expression is used to print the output of the command without its header row?

A. show_ip_int_brief[“Ëœstdout_lines’][0]

B. show_ip_int_brief[“Ëœstdout_lines’][1:]

C. show_ip_int_brief[“Ëœstdout_lines’][0][1:]

D. show_ip_int_brief[“Ëœstdout_lines’]

 


Suggested Answer: B

 

Free Access Full 300-910 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of 300-910 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your 300-910 certification journey!

Share18Tweet11
Previous Post

300-820 Practice Questions Free

Next Post

312-38 Practice Questions Free

Next Post

312-38 Practice Questions Free

312-39 Practice Questions Free

312-49 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.