What strategy can be used to handle deprecated features in web service versioning?

  • Force clients to upgrade immediately
  • Maintain backward compatibility
  • Remove deprecated features abruptly
  • Use version headers for each request
To handle deprecated features in web service versioning, maintaining backward compatibility is a common strategy. This allows existing clients to continue functioning while encouraging them to update gradually.

_______ is a tool in Docker for defining and running multi-container Docker applications.

  • Docker Compose
  • Docker Hub
  • Docker Registry
  • Docker Swarm
Docker Compose is a tool in Docker for defining and running multi-container Docker applications. It allows you to manage and orchestrate multiple containers as a single service.

How does a stress test differ from a load test in the context of web services?

  • Load testing is not applicable to web services.
  • Stress testing assesses system behavior under expected conditions, while load testing simulates extreme conditions to identify failure points.
  • Stress testing focuses on normal usage conditions, while load testing simulates extreme conditions to identify failure points.
  • Stress testing simulates extreme conditions beyond normal usage, focusing on system failure points. Load testing assesses system behavior under expected conditions, testing scalability.
Stress testing and load testing serve distinct purposes. Stress testing aims to evaluate system behavior under extreme conditions, while load testing assesses performance under expected conditions.

In REST, how are different resources typically accessed?

  • Through HTML (Hypertext Markup Language)
  • Through SOAP (Simple Object Access Protocol)
  • Through TCP (Transmission Control Protocol)
  • Through URIs (Uniform Resource Identifiers)
RESTful resources are typically accessed through URIs, providing a standardized way to identify and interact with resources.

_______ is a security vulnerability where an attacker can execute unauthorized commands.

  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Man-in-the-Middle (MitM)
  • SQL Injection
SQL Injection is a security vulnerability where an attacker can execute unauthorized commands by injecting SQL code into input fields.

In REST, changing or adding fields requires a new _______ of the API.

  • Endpoint
  • Instance
  • Method
  • Version
In REST, modifying or adding fields typically necessitates the creation of a new version of the API.

When designing a web service for a healthcare application, what encryption standards must be considered for compliance?

  • FERPA
  • GDPR
  • HIPAA
  • PCI DSS
Healthcare applications must consider compliance with the Health Insurance Portability and Accountability Act (HIPAA) for encryption standards.

What is the main advantage of using elliptic curve cryptography over RSA in web services?

  • Faster decryption speed
  • Greater compatibility with legacy systems
  • Improved resistance to quantum attacks
  • Smaller key sizes with equivalent security
Elliptic curve cryptography offers the advantage of providing equivalent security with smaller key sizes, making it more efficient for resource-constrained environments like web services.

In a case where a website allows user comments, which security measure is vital to prevent XSS through user inputs?

  • CSRF protection
  • Database normalization
  • HTTPS implementation
  • Input sanitization
To prevent XSS through user inputs, it's crucial to implement input sanitization, which involves cleaning and validating user input to mitigate potential script injection.

Which regulation primarily deals with data protection and privacy in the European Union?

  • CCPA (California Consumer Privacy Act)
  • FERPA (Family Educational Rights and Privacy Act)
  • GDPR (General Data Protection Regulation)
  • HIPAA (Health Insurance Portability and Accountability Act)
GDPR is the primary regulation in the European Union that focuses on data protection and privacy.