Question: The ability of TCP to serve multiple applications simultaneously is called:

Answer Options:

Multiplexing
Segmentation
Flow control
Connection establishment
Reliability

Answer: Multiplexing

 

Question: Breaking application data of arbitrary size into smaller fragments for delivery by IP is called:

Answer Options:

Flow control
Multiplexing
Reliability
Segmentation

Answer: Segmentation

 

Question: The three-way handshake is used in:

Answer Options:

Connection establishment
Reliability
Segmentation
Flow control
Multiplexing

Answer: Connection establishment

 

Question: The mechanism used for flow control in TCP is:

Answer Options:

Three-way handshake
Sliding window
Stop-and-wait
CSMA/CD

Answer: Sliding window

 

Question: When a TCP connection is initiated, the sequence number of the first datagram is:

Answer Options:

None of the above
100
Either A or B
A randomly chosen number

Answer: A randomly chosen number

 

Question: Flow control in TCP is used to:

Answer Options:

Slow down the receiver if necessary
Speed up the sender if necessary
Speed up the receiver if necessary
Slow down the sender if necessary

Answer: Slow down the sender if necessary

 

Question: The window size field in TCP specifies the:

Answer Options:

Amount of data the receiver is capable of processing
Sequence number of the last received datagram
Size of the window in the data center where the sender is located
Amount of data the sender is capable of processing

Answer: Amount of data the receiver is capable of processing

 

Question: Multiplexing at the Transport layer enables:

Answer Options:

Both of the above
Multiple hosts to share a common physical medium
Multiple applications on the host to share a common network connection
None of the above

Answer: Multiple applications on the host to share a common network connection

 

Question: Feature flags are a useful DevOps practice because

Answer Options:

They allow useful IT infrastructure features to be identified by end users
They allow developers on the team to share code
They isolate security vulnerabilities in the operating system
They allow administrators and developers to incrementally release new capabilities and test their impacts

Answer: They allow administrators and developers to incrementally release new capabilities and test their impacts

 

Question: Shared metrics in DevOps refer to

Answer Options:

Both developers and IT administrators using the same metrics to measure application performance
Developers using the same metrics to build and test application performance
Business leaders sharing business performance metrics with IT
IT administrators sharing infrastructure performance metrics with business leaders

Answer: Both developers and IT administrators using the same metrics to measure application performance

 

Question: An advantage of containerization is that

Answer Options:

Applications can be easily packaged for deployment on any compatible server
It helps distribute applications to end users using media such as DVDs
It improves reporting to organization leadership
It helps deploying multiple versions of the same application

Answer: Applications can be easily packaged for deployment on any compatible server

 

Question: For long term application performance, developers who focus on rapid deployment of new features should also care about

Answer Options:

Maintaining technology certifications
The popularity of the technology stack used to build the applications
The reliability of their applications
The end user interface of their applications

Answer: The reliability of their applications

 

Question: The ELK stack used for visualizing log data gets its name from

Answer Options:

The name of its creator
The Elk, one of the largest deers, and native to Montana, where the technology was created
The initials of its components: Elasticsearch, Logstash, and Kibana
The ELK river in Idaho where the first use case was established

Answer: The initials of its components: Elasticsearch, Logstash, and Kibana

 

Question: A disadvantage of IT administrators focusing excessively on application stability is

Answer Options:

Reduction in the use of container technologies
Lack of use of IT infrastructure automation
Delays in deploying new features, reducing the organization’s competitiveness
Excessive use of obsolete IT infrastructure technologies

Answer: Lack of use of IT infrastructure automation

 

Question: End-to-end build is a software development practice where

Answer Options:

The entire code base is approved by IT administrators before deployment
The entire software code base is deployed in a container
The entire software code base passes all unit tests and coding standards every day
Feedback from all end users is solicited before identifying new features to build

Answer: The entire software code base passes all unit tests and coding standards every day

 

Question: Centralized repositories are particularly well suited for

Answer Options:

Non-text files such as images, videos, and executables
Small developer teams
Building open source software
Amateur developers

Answer: Building open source software

 

Question: When using containerization technologies such as Docker

Answer Options:

Each container contains the application and its dependencies
Each container contains a copy of the target operating system
Each container is destroyed after the application is deployed on the target operating system
The target operating system provides any technical dependencies for the application in the container

Answer: Each container contains the application and its dependencies