10/207 questions · Unlock full access
Q1

A financial services firm is launching a new, highly regulated trading application. The project requirements are fully defined, documented, and have received regulatory pre-approval, leaving no room for changes. The project has a fixed deadline and budget. The development team must follow a structured, phase-by-phase process from design to deployment. Which project management methodology is most suitable for this scenario?

Q2

A startup is building a mobile backend and wants to focus exclusively on writing application logic in Node.js. They want to avoid all responsibilities related to managing operating systems, server hardware, and runtime environments. The solution must scale automatically based on incoming traffic. Which cloud computing model fulfills these requirements?

Q3

A security audit of a web server reveals that it is vulnerable to brute-force SSH login attempts. The administrator wants to implement a tool that automatically blocks IP addresses after a certain number of failed login attempts. Which of the following utilities is specifically designed for this purpose?

Q4

A development team uses Git for version control. A developer needs to integrate recent updates from the `main` branch into their `feature` branch. The project manager has mandated a clean, linear project history without any merge commits to make the commit log easier to read. Which command should the developer use to incorporate the `main` branch updates into the `feature` branch?

Q5

During a project planning session for a new e-commerce website, the team is defining requirements. The statement "The website must process 1,000 transactions per second" is an example of what type of requirement?

Q6

A system administrator is configuring a backup script using `rsync` to archive a user's home directory (`/home/user`) to a backup server. The administrator wants to ensure that bandwidth usage is minimized by only transferring the parts of files that have changed. Which `rsync` option enables this delta-transfer algorithm?

Q7

A developer wants to create a new software library and release it as open source. They want to allow others to use, modify, and distribute the code, including in proprietary, closed-source commercial products, with the only requirement being that the original copyright notice and license text are included. Which type of open-source license best meets these goals?

Q8

An organization is migrating its on-premises infrastructure to the cloud. They have a business-critical application that runs on a custom-configured virtual machine. The IT team wants to replicate their environment in the cloud, giving them full control over the operating system, its configuration, and all installed software. Which cloud service model should they choose?

Q9

True or False: In a Zero Trust security model, any device or user inside the corporate network is automatically trusted and granted access to resources.

Q10

A DevOps team is building a CI/CD pipeline. The process involves several distinct stages: compiling the code, running unit tests, packaging the application into a container, and deploying it to a staging environment. Which of the following diagrams best represents this workflow? ```mermaid flowchart TD A[Start] --> B{Code Commit} B --> C[Compile Code] C --> D[Run Unit Tests] D --> E[Package Application] E --> F[Deploy to Staging] F --> G[End] ```