IT

DevOps Quiz with GKM IT

1 / 25

What is the advantage of using Azure Managed Certificates?

2 / 25

How to check what Mac algorithm a server is using for ensuring the integrity?

3 / 25

How does Ansible ensure idempotency in tasks?

4 / 25

In Ansible, how are reusable configurations defined?

5 / 25

While automating iOS deployment with Fastlane, you encounter an error stating that the provisioning profile cannot be found. The setup was working previously, and no changes were made to the project itself. What is the most likely cause?

6 / 25

Which command is used to execute a lane defined in a Fastfile

7 / 25

What is a major benefit of using Amazon Aurora for database scaling?

8 / 25

What is a hash ring in Loki?

9 / 25

How does Chef handle infrastructure as code?

10 / 25

When using AWS CDK, what is a common anti-pattern?

11 / 25

What is the difference between a static and a shared library?

12 / 25

You deploy a containerized application in Docker, and it frequently fails to resolve external domain names despite the host system having a working DNS configuration. Upon investigation, the issue persists even after explicitly setting a custom DNS server for the container. Which internal configuration file within the container is likely being dynamically managed and causing the issue, requiring a specific override during container runtime to fix it?

13 / 25

When planning for disaster recovery in AWS RDS, which storage option is most appropriate?

14 / 25

In a hybrid cloud setup with AWS and GCP, how can you ensure consistent firewall rules for a disaster recovery environment?

15 / 25

Which AWS service can be used to cache data and reduce latency for scalable applications?

16 / 25

What is the role of Cognito Identity Pools?

17 / 25

You need to establish communication between a private server in AWS and a private server in Azure. Both servers are located in isolated environments under different accounts, with strict security policies in place. The communication must be secure and minimize the risk of policy conflicts, especially with outbound traffic from AWS. What’s the most efficient way to ensure smooth connectivity without exposing internal services or violating strict security policies in both environments?

18 / 25

How do you ensure that logs from a Docker container persist even after the container is deleted?

19 / 25

What is the difference between a static and a shared library?

20 / 25

What command is used to inspect the shared library dependencies of an executable in Linux?

21 / 25

Having just set up your first Amazon Virtual Private Cloud (Amazon VPC) network, which defined a default network interface, you decide that you need to create  and attach an additional network interface, known as an elastic network interface (ENI) to one of your instances. Which of the following statements is true  regarding attaching network interfaces to your instances in your VPC?

22 / 25

What is a major limitation when sizing a multi-cloud deployment with RDS in AWS and SQL Database in Azure?

23 / 25

Fastlane is used for

24 / 25

When setting up AWS Chatbot to receive alerts from Amazon CloudWatch, which IAM policy action would you need to allow AWS Chatbot to access the necessary CloudWatch alarm information?

25 / 25

What is the role of Azure Application Gateway in securing web applications?

0%