Cache _______ allows for efficient utilization of memory resources by storing frequently accessed data.

  • Eviction
  • Hit
  • Miss
  • Warm
Cache hit allows for efficient utilization of memory resources by retrieving frequently accessed data from the cache. A hit occurs when the requested data is found in the cache.

In a project, you need to scale up the number of instances of a particular containerized application based on increased demand. How would you achieve this using Kubernetes?

  • Deploy multiple independent pods for each instance
  • Implement a custom script to monitor and scale containers
  • Manually update the replica count in the Kubernetes Deployment
  • Use Kubernetes Horizontal Pod Autoscaling
Kubernetes Horizontal Pod Autoscaling is the preferred method to automatically scale the number of instances based on demand. It dynamically adjusts the number of pods in a deployment, ensuring optimal resource utilization.

What is Blue-Green Deployment in the context of CI/CD?

  • A cloud storage service
  • A container orchestration tool
  • A deployment strategy
  • A version control system
Blue-Green Deployment is a deployment strategy used in CI/CD. It involves having two identical environments, with one active (Blue) and the other inactive (Green). The new version is deployed to the inactive environment, and the switch is made to make it live. This approach reduces downtime and allows quick rollback if issues arise.

Which HTTP request method should be used for idempotent operations that do not modify resources?

  • DELETE
  • GET
  • POST
  • PUT
The GET method should be used for idempotent operations that do not modify resources. GET requests are considered safe and idempotent, making them suitable for operations that retrieve data without causing side effects on the server.

Which phase of the SDLC involves gathering requirements from stakeholders?

  • Design
  • Implementation
  • Requirements Gathering
  • Testing
The phase that involves gathering requirements from stakeholders is the Requirements Gathering phase. It focuses on understanding and documenting the needs and expectations of the end-users and other stakeholders.

Two-factor authentication typically involves something you know and something you _______.

  • Have
  • Possess
  • Are
  • Own
Two-factor authentication typically involves something you know (e.g., a password) and something you possess (e.g., a mobile device or security token). The correct option completes the phrase appropriately.

How does structured logging differ from traditional logging approaches?

  • Structured logging focuses solely on error messages, while traditional logging captures a broader range of events.
  • Structured logging uses a predefined format like JSON for log entries, making them machine-readable and easier to analyze. Traditional logging relies on free-form text.
  • Traditional logging is asynchronous, while structured logging is synchronous.
  • Traditional logging is suitable for small-scale applications, while structured logging is reserved for large-scale systems.
Structured logging differs from traditional logging by adopting a predefined format like JSON, enabling machine-readable and analyzable log entries. This approach enhances log consistency and facilitates automated processing.

You're tasked with implementing a backup strategy for a highly sensitive database. Outline the key considerations and steps you would take to ensure robust backup and recovery processes.

  • Define backup retention policies based on regulatory requirements
  • Encrypt backup data to enhance security
  • Implement a multi-tiered backup approach (full, incremental, differential)
  • Regularly test backup and recovery processes
To ensure robust backup and recovery processes for a highly sensitive database, implementing a multi-tiered backup approach is essential. This includes full, incremental, and differential backups, providing a comprehensive strategy for data protection and efficient recovery.

Which cryptographic protocol is commonly used for securing network communications?

  • FTP
  • HTTP
  • SSH
  • SSL/TLS
SSL/TLS (Secure Sockets Layer/Transport Layer Security) is a cryptographic protocol commonly used to secure network communications, providing a secure channel over an insecure network. It ensures the confidentiality and integrity of data during transmission.

What does Git branching allow you to do?

  • Clone a repository
  • Delete files in a repository
  • Track changes in a repository
  • Work on different features simultaneously
Git branching allows you to work on different features simultaneously. It enables developers to create independent branches for each feature or bug fix, allowing for parallel development without affecting the main codebase.