_______ is used in REST to request the server to accept the entity enclosed in the request as a new subordinate of the web resource.
- DELETE
- PATCH
- POST
- PUT
In REST, the POST method is used to request the server to accept the entity enclosed in the request as a new subordinate of the web resource. It is often used for creating a new resource or submitting data to be processed, and the server responds with the details of the newly created resource.
Kubernetes is primarily used for what purpose in containerization?
- Database management
- Front-end development
- Machine learning
- Orchestration and management of containers
Kubernetes is mainly used for orchestrating and managing containers, ensuring efficient deployment and scaling.
In the context of web services, serverless computing primarily means what?
- Direct server control for applications
- Graphic design for server architecture
- Load balancing for web servers
- Running applications without managing server infrastructure
Serverless computing in web services means running applications without managing server infrastructure, allowing developers to focus on code rather than server management.
REST APIs commonly use which method to retrieve data without affecting the resource?
- DELETE
- GET
- POST
- PUT
REST APIs commonly use the GET method to retrieve data without affecting the resource, emphasizing the idempotent nature of the operation.
During a security audit, a tester is able to execute a script in the database input field. What type of vulnerability does this indicate?
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Insecure Direct Object References (IDOR)
- SQL Injection
The ability to execute a script in the database input field points to a SQL Injection vulnerability, where malicious SQL queries can be injected and executed.
The process of converting encrypted data back into its original form is called _________.
- Decryption
- Encoding
- Encryption
- Hashing
Decryption is the process of converting encrypted data back into its original, readable form.
What advanced feature of API Gateways can be used for aggregating responses from multiple services?
- Data Merging
- Response Composition
- Result Concatenation
- Service Aggregation
API Gateways can use Response Composition as an advanced feature to aggregate responses from multiple services.
_________ encryption uses the same key for encryption and decryption.
- Asymmetric
- Private
- Public
- Symmetric
Symmetric encryption utilizes the same key for both the encryption and decryption processes.
What is the role of a 'Pod' in Kubernetes?
- A collection of multiple containers sharing the same network namespace
- A configuration file defining Kubernetes deployment settings
- A high-level Kubernetes resource for managing persistent data storage
- The smallest unit in the Kubernetes object model, representing a single instance of a running process
In Kubernetes, a Pod is the smallest unit, representing a single instance of a running process and can contain one or more containers.
For deleting a resource in REST, what HTTP method is implemented?
- DELETE
- PATCH
- POST
- PUT
The DELETE method in REST is used to delete a resource. It requests the removal of the specified resource, and the operation is idempotent, meaning that subsequent requests have no additional effect once the resource is deleted.
_______ is a constraint of RESTful services that dictates the simplicity of the interface provided to services.
- HATEOAS
- Idempotence
- Statelessness
- Uniform Interface
In REST, the Uniform Interface constraint emphasizes a simple and consistent interface for services, promoting ease of use and understanding.
How does a stub differ from a mock in integration testing?
- A mock is a complete, functional implementation of a component
- A mock is only used in object-oriented programming
- A stub is a simplified implementation of a component with fixed behavior
- A stub is used for unit testing, while a mock is used for integration testing
In integration testing, a stub is a simplified version of a component with predetermined behavior, while a mock is a complete, functional implementation with expected behavior.