Which HTTP request method should be used for idempotent operations that do not modify resources?
- DELETE
- GET
- POST
- PUT
The GET method should be used for idempotent operations that do not modify resources. GET requests are considered safe and idempotent, making them suitable for operations that retrieve data without causing side effects on the server.
Which phase of the SDLC involves gathering requirements from stakeholders?
- Design
- Implementation
- Requirements Gathering
- Testing
The phase that involves gathering requirements from stakeholders is the Requirements Gathering phase. It focuses on understanding and documenting the needs and expectations of the end-users and other stakeholders.
_______ is a server-side language commonly used for building scalable web applications and APIs.
- Node.js
- PHP
- Python
- Ruby
Node.js is a server-side language commonly used for building scalable web applications and APIs. It allows developers to use JavaScript on the server-side.
What is the purpose of the V-model in software development?
- Variability Model
- Verification and Validation Model
- Version Control Model
- Visualization Model
The V-model is a software development model that emphasizes the importance of verification and validation. It represents a systematic and sequential path where each phase must be completed before moving to the next. The left side of the 'V' represents the development phases, while the right side represents the corresponding testing phases.
AWS _______ is a service for automatically scaling applications.
- EC2
- Elastic Beanstalk
- Lambda
- S3
AWS Elastic Beanstalk is a fully managed service that makes it easy to deploy and run applications in multiple languages. It automatically handles the capacity provisioning, load balancing, scaling, and application health monitoring.
Two-factor authentication typically involves something you know and something you _______.
- Have
- Possess
- Are
- Own
Two-factor authentication typically involves something you know (e.g., a password) and something you possess (e.g., a mobile device or security token). The correct option completes the phrase appropriately.
How does structured logging differ from traditional logging approaches?
- Structured logging focuses solely on error messages, while traditional logging captures a broader range of events.
- Structured logging uses a predefined format like JSON for log entries, making them machine-readable and easier to analyze. Traditional logging relies on free-form text.
- Traditional logging is asynchronous, while structured logging is synchronous.
- Traditional logging is suitable for small-scale applications, while structured logging is reserved for large-scale systems.
Structured logging differs from traditional logging by adopting a predefined format like JSON, enabling machine-readable and analyzable log entries. This approach enhances log consistency and facilitates automated processing.
You're tasked with implementing a backup strategy for a highly sensitive database. Outline the key considerations and steps you would take to ensure robust backup and recovery processes.
- Define backup retention policies based on regulatory requirements
- Encrypt backup data to enhance security
- Implement a multi-tiered backup approach (full, incremental, differential)
- Regularly test backup and recovery processes
To ensure robust backup and recovery processes for a highly sensitive database, implementing a multi-tiered backup approach is essential. This includes full, incremental, and differential backups, providing a comprehensive strategy for data protection and efficient recovery.
Which cryptographic protocol is commonly used for securing network communications?
- FTP
- HTTP
- SSH
- SSL/TLS
SSL/TLS (Secure Sockets Layer/Transport Layer Security) is a cryptographic protocol commonly used to secure network communications, providing a secure channel over an insecure network. It ensures the confidentiality and integrity of data during transmission.
What does Git branching allow you to do?
- Clone a repository
- Delete files in a repository
- Track changes in a repository
- Work on different features simultaneously
Git branching allows you to work on different features simultaneously. It enables developers to create independent branches for each feature or bug fix, allowing for parallel development without affecting the main codebase.