Thursday , November 21 2024

CHybrid Cloud Conference – Backend Services for Containers Cognitive Class Exam Answer:-

Course Name:- Hybrid Cloud Conference – Backend Services for Containers

Hybrid Cloud Conference – Backend Services for Containers Cognitive Class final Exam Answers:-

Question 1. Who is the primary audience for the Make Your Solution into a Backend Service on OpenShift® track?

  • Cloud-native application developers
  • Cloud-native application deployers
  • OpenShift® cluster administrators
  • Independent Software Vendors (ISVs)
  • Global Systems Integrators (GSIs)

Question 2. Which of these is not a goal of the Make Your Solution into a Backend Service on OpenShift® track?

  • Make the service deploy  successfully in OpenShift
  • Make the service self-managing so that customers don’t have to manage it
  • Incorporate metering and billing into the service
  • Get the service certified by Red Hat
  • Make the service ready to add to service catalogs like Red Hat Marketplace

Question 3. covered in the Make Your Solution into a Backend Service on OpenShift® track?

  • Introduction to the sessions in the track
  • How to control which applications can be deployed to a cluster
  • How to control which applications can access the Linux functions
  • How to automate toil for site reliability engineers (SREs)
  • Best practices for making container images more secure, scalable and manageable

Question 4. Which of the following standards are required for building a universal application image (UAI)?

  • Image is based on a Red Hat Universal Base Image (UBI)
  • Image contains license files
  • Image is tagged with a unique version number
  • Application must implement a Health endpoint
  • All of the above

Question 5. What is the primary purpose of the GitHub web hook created by the Cloud-Native Toolkit?

  • Increments the version tag
  • Creates a new OpenShift project
  • Re-starts the pods associated with the deployment
  • Triggers the current pipeline to run
  • Performs unit tests on the application source

Question 6. Which command creates and configures your Red Hat OpenShift project for use with the Cloud-Native Toolkit?

  • oc login
  • oc sync
  • oc status
  • oc pipeline
  • oc start

Question 7. What is the recommended way to provide service credentials to your deployed application?

  • Hard coded in source
  • An ENV file stored in the source directory
  • Config maps
  • Secrets
  • Never use credentials in deployments

Question 8. What tool from the Cloud-Native Toolkit performs code coverage tests on application source?

  • SonarQube
  • Artifactory
  • Image Registry
  • Argo CD
  • Lint

Question 9. What is the primary purpose for security context constraints (SCCs)?

  • Enables OpenShift cluster administrators the ability to provide containers unlimited access to an OpenShift cluster
  • Enables OpenShift cluster administrators the ability to prevent user access to OpenShift resources
  • Enables OpenShift cluster administrators the ability to authorize container permissions
  • Enables OpenShift cluster administrators the ability to set limits on user accounts
  • Enables OpenShift cluster administrators the ability to make containers more isolated

Question 10. How are security context constraints (SCCs) associated with deployments?

  • Via the RBAC user account that created the Deployment resource
  • Via an RBAC service account specified by the Pod resource
  • The OpenShift administrator assigns the SCC to the Deployment resource
  • Via the project the Deployment resource is created in
  • The OpenShift administrator assigns the SCC to the project

Question 11. How do deployments request additional permissions?

  • With a Security Context specified in the deployment manifest
  • A superuser account deploys the container
  • A cluster administrator deploys the container
  • With environment variables specified in the deployment manifest
  • Deploy the container as a privileged container

Question 12. Which of the following is NOT an SCC permission type?

  • Privileges
  • Projects
  • Access Controls
  • Capabilities

Question 13. What types of permissions can be requested with a Security Context?

  • Run as a specific user
  • Perform Linux commands
  • Run as a specific group
  • Run as a privileged container
  • All of the above

Question 14. Which statement is not true about operators?

  • An operator is a Kubernetes application
  • An operator extends Kubernetes
  • An operator runs in the control plane
  • An operator manages a backend service
  • An operator automates an SRE’s toil

Question 15. Which technology is not one typically used to implement operators?

  • Helm
  • Ansible
  • Terraform
  • Go

Question 16. Which capability is not one of the Operator Capability Levels?

  • Basic install
  • Seamless upgrades
  • Full lifecycle
  • Deep insights
  • Machine learning

Question 17. Which component is the heart of an operator’s structure?

  • Controller
  • Operand
  • Hybrid cloud
  • Operator Hub
  • StatefulSet

Question 18. Which component tells the operator to reconcile?

  • Custom resource
  • Custom resource definition
  • Controller manager
  • Operand
  • Service account

About Machine Learning

Check Also

Python for Data Science Cognitive Class Exam Answers:-

Course Name:- Python for Data Science Module 1. Python Basics Question 1. What is the …

Leave a Reply

Your email address will not be published. Required fields are marked *