MODULE 7 Flashcards

1
Q

What is the average cost per hour of an enterprise outage for the largest enterprises?

$700,000.00 per hour

$500,000.00 per hour

$300,000.00 per hour

$100,000.00 per hour

A

$300,000.00 per hour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is idempotency in IT automation?

the quality of software / the property of operations that always produce the same result when executed

the reusing of shell commands

the security level of software

the scripting of shell commands

A

the quality of software / the property of operations that always produce the same result when executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A student is creating an Ansible playbook to practice management automation of a Cisco router. Which command should the student add to the playbook to find the interface names, assigned IP addresses, and status of interfaces on the router?

show running-config

show ip interface brief

show ip route

ip address

A

show ip interface brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When following the best practices and core principles of DevOps, how is failure considered?

Failure is simply “repair work”.

Failure should only occur in Ops.

Failure is normal.

Failure should not influence software design methodology.

A

Failure is normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a canary deployment?

the use of two identical servers with load balancers to redirect traffic for an entire server as needed

a server-by-server switchover to a new release deployment

a production test using a chaos tool to inject random failures with a limited blast-radius

the switchover of selected users to a new release deployment

A

the switchover of selected users to a new release deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two challenges of cloud computing technologies? (Choose two.)

utilizing generic host environments

maintaining access control

maintaining configurational consistency of platforms

managing costs

requesting additional resources

A

maintaining access control
managing costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which technology can run on bare metal or on large virtual machines to simulate Cisco networks and utilities?

Git

Puppet

Ansible

VIRL

A

VIRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An analyst is using Ansible to perform remote management tasks on network devices. Which file type is in the Ansible file structure that describes the devices under management?

role folders and files

variable file

inventory file

playbook file

A

inventory file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an error budget in the DevOps/SRE culture?

It is the planned percentage of a monetary contract that is given back to a customer when an SLO is not met.

It is a best-practice metric for availability, equivalent to only six minutes of unplanned offline time per year.

It is an internal-only metric for calculating the actual availability of a service.

It is a method for measuring allowable errors as a gate on release speed.

A

It is a method for measuring allowable errors as a gate on release speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which programming language is used by Chef to execute the recipes?

Bash

Python

Ruby

Javascript

A

Ruby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A developer issues a Linux command python3 -m venv devenv. What is the developer trying to achieve?

to create a Python 3 virtual environment named devenv

to install the devnet tool sets in the Python 3 virtual environment named venv

to activate the Python 3 virtual environment named devenv

to enter the Python 3 virtual environment named venv using the devnet tool sets

A

to create a Python 3 virtual environment named devenv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most common cause of IT outages?

a threat actor targeting the enterprise equipment

an experienced engineer implementing a configuration using automation

an engineer misconfiguring a device or network with manual changes

an experienced engineer using an open source product

A

an engineer misconfiguring a device or network with manual changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an unopinionated component in a software ecosystem?

a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary

a component that is classified as open source and does not require the implementation of specific vendor products

a component that may function in a limited ability in order to compensate for the selection of companion components or architectures

a component that requires a specific companion component in order to provide full stack implementation

A

a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the use of container technologies, what is a function of platform abstraction when considering the deployment of a product in a cloud environment?

Traditional complementary software components such as a database server and web server would be implemented as a single containerized application

Applications require re-engineering in order to implement scalability and consolidation

A containerized app can run on a generically-specified host environment

Applications are aware of underlying hardware configurations and are customized to provide increased functionality

A

A containerized app can run on a generically-specified host environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A student is setting up the DEVASC-LAB VM and CSR1000v VM in VirtualBox that is installed on the local computer. Both VMs are imported to the VirtualBox successfully. The student starts both VMs and tries to verify communications to the CSR1000v VM by opening a web browser on the local computer and enters the URL https://192.168.56.101. After a few seconds, an error message displays that “The connection has timed out”. How can the student verify the IP address assigned by DHCP to the CSR1000v virtual router?

Issue the ping 192.168.56.101 command on the local computer.

Issue the show ip interface brief command in the CSR1000v VM.

Issue the show running-config command in the CSR1000v VM.

Issue the ifconfig command in the CSR1000v VM.

A

Issue the show ip interface brief command in the CSR1000v VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the historical correlation between software developers and IT operations?

Developers had the job of creating applications. Operations had the job of verifying that these applications work for users.

Operations had the job of brainstorming applications. Developers had the job of testing that these applications work for users and the business.

Operations had the job of testing applications. Developers had the job of implementing these applications for clients.

Developers had the job of testing applications. Operations had the job of implementing these applications for clients.

A

Developers had the job of creating applications. Operations had the job of verifying that these applications work for users.

17
Q

How is an error budget calculated in the DevOps/SRE culture?

An error budget is the difference between the SLO and the SLI

An error budget is the difference between the SLO and 100% availability

An error budget is the difference between the SLO and the SLA

An error budget is the difference between the SLA and 100% availability

A

An error budget is the difference between the SLO and 100% availability

18
Q

In reviewing a formalized agreement between an organization and a customer, what is the purpose of an SLI?

An SLI is a specific set of steps for slowing releases as errors occur

An SLI is an easy to complete, external agreement that is set between the organization and the customer

An SLI is a benchmark metric used to determine and describe SLOs

An SLI is an agreed-upon number of errors per unit time

A

An SLI is a benchmark metric used to determine and describe SLOs

19
Q

What is the default shell commonly used on macOS and Linux?

Bash

csh

tcsh

Bourne

20
Q

Which type of automation includes scripting that may be dangerous if the starting state is not completely known and controlled?

stateful

stateless

declarative

procedural

A

procedural

21
Q

What is an imperative procedure?

An ordered sequence of commands that is used to reach a specific end state

A set of commands that require administrator privileges and can only be executed on a local system

A set of commands that is piped to a remote host and immediately executed

A set of commands that examines a target and only performs the tasks needed to achieve the desired state

A

An ordered sequence of commands that is used to reach a specific end state

22
Q

Which statement describes the declarative static model?

A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state

A declarative model will execute code that is sequentially task-driven instead of focusing on deployment-specific details

A declarative model will follow a specific order of sequential steps in order to effect changes on a target system

A declarative model will subdivide code into top-down sections and condition-driven handlers

A

A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state

23
Q

Which component in the pyATS ecology handles bundling and running jobs?

EasyPy

AEtest

Genie

Clover

24
Q

An engineer has just created a backup file of a Cisco VIRL network simulation. Which command should be used to compare the most recent .virl file with the previous backup file?

diff

pyats

knife

source

list

25
Q

While working in the Ansible code structure, which type of file contains a sequence of tasks, executed in top-down order?

.virl

.yml

.py

.txt

26
Q

What is a standard command to create a Python virtual environment?

sudo apt-get install python3-pip

pip install [options] [package-index-options]…

python3 -m venv /path/to/new/virtual/environment

source bin/activate

A

python3 -m venv /path/to/new/virtual/environment

27
Q

A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. However, an error message returns.

A

The destination host IP address is wrong.
The SSH service does not start on the host.