Topic 1
Which two practices help make the security of an application a more integral part of the software development lifecycle?
(Choose two.)
A E
Topic 1
Which description of a canary deployment is true?
D
Topic 1
DRAG DROP
Drag and drop the operations from the left into the correct order on the right when using CI/CD, assuming that there are no
failures or conflicts.
Select and Place:
Topic 1
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI
tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not
start.
Why did the pipeline fail to start?
C
Topic 1
Refer to the exhibit. What is causing the requests code to fail?
B
Topic 1
A CI/CD pipeline that builds infrastructure components using Terraform must be designed. A step in the pipeline is needed
that checks for errors in any of the .tf files in the working directory. It also checks the existing state of the defined
infrastructure.
Which command does the pipeline run to accomplish this goal?
D
Topic 1
Configuration changes to the production network devices are performed by a CI/CD pipeline. The code repository and the CI
tool are running on separate servers. Some configuration changes are pushed to the code repository, but the pipeline did not
start.
Why did the pipeline fail to start?
C
Topic 1
Which type of testing should be integrated into a CI/CD pipeline to ensure the correct behavior of all of the modules in the
source code that were developed using TDD?
B
Topic 1
DRAG DROP
The IaC configuration for an application is being deployed using a CI/CD pipeline. Drag and drop the steps for this pipeline
from the left into the correct order that they would be executed on the right. Not all options are used.
Select and Place:
Topic 1
A DevOps engineering wants to build an application implementation based on the CI/CD pipeline model. Which service
should be used to provide hosted continuous service for open and private projects?
D