The split() method in JavaScript is used to split a string into an array of _______.

  • Characters
  • Elements
  • Objects
  • Substrings
The split() method is used to split a string into an array of substrings based on a specified delimiter. It does not create objects, characters, or elements, but rather substrings.

Which of the following is a common testing framework used in TDD for JavaScript?

  • Jasmine
  • Jest
  • Mocha
  • Protractor
Jest is a widely used testing framework for Test-Driven Development (TDD) in JavaScript. It is known for its simplicity, speed, and built-in features like snapshot testing and mocking.

You realize that the last few commits in your Git history are incorrect and need to be removed. What command(s) would you use to accomplish this?

  • git clean -f
  • git rebase -i HEAD~n
  • git reset --hard HEAD~n
  • git revert
The correct command is git rebase -i HEAD~n, where 'n' is the number of commits you want to go back. Interactive rebase allows you to edit, remove, or squash commits before applying them.

The HTML element contains _______ information about the document.

  • Content
  • Metadata
  • Structure
  • Styling
The HTML element contains metadata information about the document, such as the title, character encoding, and links to external resources like stylesheets and scripts.

Which protocol is commonly used for authentication in web applications?

  • HTTP
  • LDAP
  • OAuth 2.0
  • SSL/TLS
OAuth 2.0 is commonly used for authentication in web applications. It is an open standard for access delegation commonly used in authorization scenarios.

_______ is a phenomenon where two or more transactions are waiting indefinitely for resources held by each other, resulting in none of them being able to proceed.

  • Concurrency
  • Deadlock
  • Starvation
  • Thrashing
Deadlock is a phenomenon in which two or more transactions are waiting indefinitely for resources held by each other, leading to a state where none of the transactions can proceed. It is a critical issue in concurrent systems and requires careful handling to avoid system gridlock.

Infrastructure as Code helps in achieving _______ infrastructure deployment.

  • Elastic
  • Incremental
  • Manual
  • Rapid
Infrastructure as Code helps in achieving rapid infrastructure deployment. By defining and managing infrastructure through code, deployment becomes faster, more consistent, and scalable.

A company wants to deploy a web application with high availability. Which cloud platform service would you suggest, and how does it ensure high availability?

  • AWS Elastic Beanstalk
  • Azure App Service
  • Google App Engine
  • IBM Cloud Foundry
Azure App Service is recommended for deploying a web application with high availability. It offers automatic load balancing, geographic distribution, and scaling capabilities to ensure high availability and performance.

In which phase of the SDLC are software requirements documented?

  • Design
  • Implementation
  • Requirements Definition
  • Testing
Software requirements are documented in the Requirements Definition phase of the SDLC. This phase involves specifying what the software should do and defining the features and functionalities it needs to have.

What does the term "zero-day vulnerability" refer to in the context of cybersecurity?

  • A flaw that exists for zero days before being patched
  • A security flaw that is exploited before the software vendor releases a fix
  • A vulnerability that doesn't require any action to mitigate
  • A vulnerability with zero impact on security
In cybersecurity, a "zero-day vulnerability" refers to a security flaw that is exploited before the software vendor releases a fix. It implies that attackers are already exploiting the vulnerability, and there are zero days of protection for users.