The Agile practice of breaking work into small, manageable increments is known as ___________.

  • Adaptive Development
  • Incremental Development
  • Iterative Development
  • Waterfall Development
Incremental Development is a key Agile practice where work is divided into small, manageable parts called increments. These increments are completed iteratively, allowing for continuous feedback and improvement throughout the development process.

SMTP is used for ___________ emails.

  • Both sending and receiving
  • Forwarding
  • Receiving
  • Sending
SMTP (Simple Mail Transfer Protocol) is primarily used for sending emails from a client to a server or between servers. It handles the process of sending the message and ensures it reaches the recipient's email server. While email clients can also receive emails using protocols like POP3 or IMAP, SMTP's main function is sending.

The ___________ property in binary search trees ensures that for every node, all nodes in its left subtree have keys less than its own, and all nodes in its right subtree have keys greater than its own.

  • Balance
  • Depth
  • Order
  • Search
The property in binary search trees that ensures all nodes in the left subtree have keys less than the node's own key, and all nodes in the right subtree have keys greater than the node's key is known as the order property. This property is fundamental to the functioning of binary search trees as it enables efficient searching by narrowing down the search space at each step based on the comparison of keys.

How does Git handle merge conflicts, and how can they be resolved?

  • Automatically resolves conflicts
  • Ignoring conflicts
  • Manual resolution by the user
  • Reverting to a previous commit
Git handles merge conflicts by marking them in the code and prompting the user for manual resolution. This involves reviewing the conflicting changes, choosing the correct versions, and then committing the resolved files back into the repository.

In a highly regulated industry like healthcare, how would you ensure compliance when deploying containerized applications?

  • Automated vulnerability scanning and patch management
  • Continuous monitoring and auditing
  • Data encryption and access control
  • Secure API integration and identity management
Ensuring compliance in healthcare when deploying containerized applications involves continuous monitoring and auditing. This includes tracking changes, monitoring access, and ensuring adherence to regulatory standards such as HIPAA. Automated vulnerability scanning and patch management are important for maintaining a secure environment, while data encryption and access control safeguard sensitive information. Secure API integration and identity management further enhance security and compliance by managing user access and authentication. Overall, a comprehensive approach encompassing these measures is essential for regulatory compliance in healthcare.

Which encryption protocol is considered more secure for protecting wireless network traffic: WEP or WPA2?

  • Both are equally secure
  • None of the above
  • WEP
  • WPA2
WPA2 is considered more secure than WEP for protecting wireless network traffic. WEP (Wired Equivalent Privacy) is an older and less secure encryption protocol that can be more easily compromised, while WPA2 (Wi-Fi Protected Access 2) offers stronger encryption and security features, making it a better choice for protecting sensitive data on wireless networks.

In OSPF (Open Shortest Path First) routing protocol, LSAs (Link State Advertisements) are flooded within a ___________.

  • Broadcast Domain
  • Link-State Area
  • OSPF Domain
  • Routing Domain
Link-State Areas are specific to OSPF and are areas within an OSPF network where LSAs are flooded and SPF calculations are performed independently. Each area has its own link-state database and communicates summarized routing information with other areas through Area Border Routers (ABRs). Understanding OSPF areas is crucial for network design and optimization.

In dynamic programming, the ___________ technique is used to store previously computed results...

  • Backtracking
  • Divide and Conquer
  • Greedy
  • Memoization
Dynamic programming often uses the memoization technique to store previously computed results in a data structure (like an array or a hash map) to avoid redundant computations. This helps in improving the efficiency of dynamic programming algorithms by reusing calculated values.

What is the purpose of VLANs (Virtual Local Area Networks) in network infrastructure?

  • VLANs enable logical segmentation of a physical network into multiple isolated broadcast domains.
  • VLANs enhance network scalability by reducing the need for physical infrastructure changes when adding or moving devices.
  • VLANs improve network security by controlling broadcast traffic and isolating network segments logically.
  • VLANs simplify network management by allowing administrators to group devices based on function or team.
VLANs play a crucial role in modern network infrastructures by providing flexibility, security, and scalability. They help in optimizing network performance, enhancing security by limiting broadcast domains, and simplifying administration tasks by logically organizing devices into virtual groups.

NoSQL databases are often preferred for applications requiring high _________ and _________.

  • Consistency
  • Durability
  • Flexibility
  • Scalability
NoSQL databases are favored for their scalability, which allows them to handle large volumes of data and high traffic loads efficiently. Additionally, they offer flexibility in data modeling, enabling developers to adapt schemas easily as application requirements evolve. These characteristics make NoSQL databases suitable for applications demanding scalability and flexibility, such as web applications, IoT platforms, and big data analytics.