DevOps by IBM: DevOps For Dummies
DevOps Essential concepts: 100+ DevOps Essential concepts
A) DevOps is a set of practices aiming to automate and improve the relationship between software development and IT operations. It fosters collaboration, communication, and integration throughout the development lifecycle.
B) DevOps is a new programming language designed specifically for automating IT processes, making it easier for developers to code with minimal collaboration.
C) DevOps is a project management framework used to define and organize tasks between development and operations teams without the need for automation tools.
D) DevOps is a cloud-based service that automatically resolves all software development and operational issues without human intervention.
A) CI refers to continuously building and testing infrastructure without focusing on code or collaboration.
B) CI automates the deployment process, sending code directly to production without any testing or validation.
C) CI is the process of integrating third-party software into applications after deployment to enhance functionality.
D) CI involves regularly merging code changes into a shared repository. It helps identify and fix integration issues early, ensuring a more stable and reliable codebase.
A) CD refers to continuous monitoring of applications after they are deployed to check for any errors in real-time.
B) CD automates the process of deploying code changes to production after passing automated tests. It allows for faster and more frequent releases.
C) CD is the practice of continuously developing new features without testing, ensuring fast releases.
D) CD involves deploying only security patches and updates without touching core application code.
A) Version control automates the building and testing of code before deployment to a production environment.
B) Version control allows teams to deploy code changes directly to production without any review process.
C) Version control, like Git, helps track changes in code, collaborate efficiently, and roll back to previous states if needed. It ensures code integrity and collaboration among team members.
D) Version control focuses on the management of infrastructure resources, ensuring servers and networks are always up-to-date.
A) Containers are virtual machines that emulate hardware and allow developers to build applications from scratch in isolated environments.
B) Containers automate the testing of applications by providing simulated production environments for manual quality assurance processes.
C) Containers are used to manage databases and store code repositories, ensuring safe and encrypted storage solutions for DevOps teams.
D) Containers encapsulate applications and their dependencies, ensuring consistency across different environments. Tools like Docker enable easy deployment and scalability.
A) IaC refers to the coding standards and practices that ensure applications meet industry compliance and regulatory requirements.
B) IaC is a database management practice that allows the storing and versioning of data in code repositories.
C) IaC allows the automation of infrastructure provisioning through code, promoting consistency, repeatability, and efficient resource management.
D) IaC focuses on the security aspects of development and ensures that all infrastructure is compliant with safety protocols.
A) Automated testing primarily focuses on user experience and helps design better interfaces for applications before deployment.
B) Automated testing replaces manual quality assurance processes entirely, reducing the need for collaboration between developers and testers.
C) Automated testing ensures code quality and reduces the risk of bugs by running tests automatically whenever code changes are made.
D) Automated testing generates infrastructure provisioning scripts to ensure that environments are set up correctly for new code releases.
A) Monitoring and logging are used only for auditing purposes and have no effect on application performance during production.
B) Monitoring and logging help detect and diagnose issues in real-time, ensuring the reliability and performance of applications.
C) Monitoring and logging automatically resolve all issues detected in the application, preventing any downtime or failure.
D) Monitoring and logging are applied solely to infrastructure, ensuring that servers are functioning correctly, with no regard for the application layer.
A) Microservices allow developers to build monolithic applications with centralized services, promoting better collaboration among teams.
B) Microservices are used to implement security features across applications, ensuring all services meet compliance standards.
C) Microservices architecture breaks down applications into smaller, independent services, aligning with DevOps principles by enabling agility, scalability, and easier maintenance.
D) Microservices focus on the deployment of entire systems as a single unit, reducing the need for continuous integration and delivery.
A) DevOps eliminates the need for security reviews by focusing on automation and rapid deployment, trusting that security is not compromised.
B) DevOps adds security measures only at the final stage of production, ensuring minimal disruptions during development and testing phases.
C) DevOps addresses security concerns by delegating them entirely to third-party security teams who monitor applications after deployment.
D) DevSecOps integrates security practices throughout the development process, ensuring that security is not a bottleneck but an integral part of the workflow.
For more Practice Questions
Bitbucket getting started: git init, clone, alias, config commands by Bitbucket
Bitbucket workflows: Git workflows: forking, gitflow, centralized, feature flow
Bitbucket inspecting repo: git status, tag, blame and log by Bitbucket
Bitbucket using branches: git checkout, branch, merge, merge conflicts by Bitbucket
Bitbucket syncing: git remote, fetch and push by Bitbucket
Bitbucket pull request: Pull request by Bitbucket
Bitbucket saving changes: git add, commit, diff, stash commands by Bitbucket
Bitbucket rewriting history: git commit, rebase and reflog by Bitbucket
Bitbucket undoing changes: git checkout, clean, revert, reset commands by Bitbucket
A) git start
B) git init
C) git create
D) git new
A) To create a new branch in a repository.
B) To copy an existing repository to a new location.
C) To update the current repository with changes from the remote repository.
D) To initialize a new Git repository.
A) git status
B) git log
C) git info
D) git check
A) It merges changes from one branch into another.
B) It creates, lists, or deletes branches in your repository.
C) It checks out a specific branch to your working directory.
D) It synchronizes local branches with remote branches.
A) To request a review and merge of code changes from one branch to another.
B) To delete a branch from the repository.
C) To create a new feature branch.
D) To push local changes to a remote repository.
A) git add
B) git commit
C) git stage
D) git save
A) git merge
B) git combine
C) git join
D) git connect
A) git view
B) git history
C) git log
D) git record
A) git delete
B) git clean
C) git remove
D) git discard
A) git diff
B) git compare
C) git changes
D) git status
Linux for Beginners: The Ultimate Guide To The Linux Operating System & Linux Commands 1st Edition
Linux networking: Guide 101
Network errors Linux : Troubleshooting guide covering common network-related issues encountered on Linux systems, offering solutions and tips to resolve connectivity problems, configuration issues, and other network errors.
A) ls
B) list
C) show
D) display
A) pwd
B) dir
C) current
D) whereami
A) To configure the firewall settings.
B) To list and configure network interfaces.
C) To display the current routing table.
D) To check the connectivity of a website.
A) netstat
B) ping
C) ifconfig
D) traceroute
A) sudo root
B) sudo -i
C) su root
D) root login
A) dig
B) netstat
C) nslookup
D) ping
A) To check file permissions.
B) To display network statistics.
C) To test network connectivity by sending packets to a host.
D) To configure the IP address of a network interface.
A) top
B) free
C) df
D) htop
A) tail
B) cat
C) less
D) head
A) shutdown -h now
B) poweroff
C) halt -p
D) stop -all
For more Practice Questions
A) To manage system resources and prioritize tasks.
B) To indicate the percentage of CPU time that is not being used.
C) To handle user logins and security authentication.
D) To facilitate communication between hardware and software.
A) It manages system startup and user sessions.
B) It controls memory allocation and process scheduling.
C) It handles network communication and security protocols.
D) It serves as a user interface for process management.
A) Managing threads and processes.
B) Emulating Visual DOS machines (VDM).
C) Creating temporary files.
D) Executing kernel-level operations.
Computer Network Basic Notes for Beginners: These computer networking basics notes serve as a foundational resource for beginners looking to understand the fundamentals of computer networks, networking protocols, and communication technologies.
Proper Notes on OSI Model: Comprehensive and organized notes providing a clear understanding of the OSI (Open Systems Interconnection) model, its seven layers, and their respective functions.
TCP and UDP: This article provides a detailed exploration of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), two core components of the internet protocol suite.
TCP/UDP Port cheatsheet: TCP/UDP Port Numbers cheat sheet
IP: Ping - Basic Network Troubleshooting: Need To Know Basis Ping By Jorgen Lanesskog
A) To define the physical components of a network.
B) To establish a framework for communication between different network systems.
C) To enhance data encryption protocols.
D) To manage hardware device configurations.
A) 5
B) 7
C) 9
D) 6
A) Application Layer
B) Transport Layer
C) Network Layer
D) Data Link Layer
A) TCP is connection-oriented, while UDP is connectionless.
B) TCP provides faster transmission than UDP.
C) UDP guarantees packet delivery, while TCP does not.
D) TCP operates at the Network Layer, while UDP operates at the Data Link Layer.
A) 80
B) 443
C) 21
D) 25
A) nslookup
B) ping
C) traceroute
D) netstat
A) Data Link Layer
B) Network Layer
C) Transport Layer
D) Application Layer
A) To assign static IP addresses to devices.
B) To dynamically assign IP addresses to devices on a network.
C) To provide secure communication over the internet.
D) To manage network traffic and reduce congestion.
A) Wireshark
B) ping
C) ifconfig
D) netstat
A) HTTP
B) FTP
C) HTTPS
D) Telnet
A)
B)
C)
D)
A) def my_function():
B) function my_function():
C) create my_function():
D) define my_function():
A) // This is a comment
B) /* This is a comment */
C) # This is a comment
D) -- This is a comment
A) try/except
B) catch/throw
C) handle/resolve
D) error/exception
A) ababab
B) 3ab
C) 'ab' * 3
D) 3 * 'ab'
A) list.to_set()
B) set(list)
C) convert(list, set)
D) to_set(list)
A) class
B) define
C) create
D) function
A) include math
B) import math
C) using math
D) require math
A) tuple
B) string
C) list
D) frozenset
A) my_list[0]
B) my_list{0}
C) my_list(1)
D) my_list.first()
Shell Scripting: UNIX Shell Scripting Focus Training Services
Bash: Notes for Professionals
A) ls
B) dir
C) list
D) show
A) mkdir new_directory
B) create new_directory
C) new_directory mkdir
D) dir new_directory
A) cd
B) chdir
C) change
D) goto
A) To change file ownership
B) To change file permissions
C) To change file content
D) To change the current directory
A) show file.txt
B) cat file.txt
C) display file.txt
D) open file.txt
A) Searches for a specific string in a file
B) Deletes files
C) Displays system information
D) Copies files
A) ps
B) processes
C) running
D) jobs
A) cp
B) copy
C) duplicate
D) mv
A) rm
B) del
C) erase
D) remove
A) help command
B) man command
C) guide command
D) info command
Nginx: Getting started with nginx
Nginx handbook: Essential Nginx Commands / Concepts
NGINX as an API Gateway: Deploying NGINX as an API Gateway
A) Web server and reverse proxy
B) Database management system
C) Operating system
D) Email server
A) nginx start
B) service nginx start
C) systemctl nginx start
D) run nginx
A) nginx -t
B) nginx test
C) check nginx
D) nginx config-check
A) A configuration section for handling specific requests
B) A physical server
C) A type of virtual machine
D) A command to restart Nginx
A) To authenticate and route requests to backend services
B) To serve static content
C) To manage database connections
D) To log server activity
A) root
B) directory
C) location
D) path
A) Serving web content
B) Managing databases
C) Compiling software
D) Monitoring network traffic
A) a2ensite site_name
B) enable site_name
C) apache enable site_name
D) site_name enable
A) httpd.conf
B) nginx.conf
C) apache.conf
D) config.conf
A) service apache2 restart
B) apache restart
C) restart apache2
D) httpd restart
Docker Complete: Your ultimate guide to Docker, covering everything from the basics to advanced strategies, making containerization and application deployment easy to understand and implement.
Dockerfile_ A key Component in Containerization: Understanding Dockerfile: A Key Component in Containerization
Docker, Tips & commands : Tips & commands
Docker Tutorial: All about Docker concept
A) Containerization of applications
B) Virtualization of servers
C) Management of databases
D) Deployment of web servers
A) docker run
B) docker create
C) docker new
D) docker start
A) A text file with instructions to build a Docker image
B) A container running on Docker
C) A command to manage Docker containers
D) A Docker command-line tool
A) docker ps
B) docker list
C) docker show
D) docker running
A) To optimize the build process by using multiple stages for different tasks
B) To create multiple containers from one image
C) To scale Docker containers
D) To manage Docker networks
A) docker stop
B) docker kill
C) docker end
D) docker terminate
A) docker rmi image_name
B) docker remove image_name
C) docker delete image_name
D) docker clean image_name
A) A native clustering and orchestration tool for Docker containers
B) A type of Docker image
C) A command to manage networks
D) A script for automated builds
A) To define and run multi-container Docker applications
B) To create Docker images
C) To manage Docker networks
D) To update Docker containers
A) docker logs container_name
B) docker view logs container_name
C) docker show logs container_name
D) docker inspect container_name
For more practice questions
Kubernetes Basic Concept: Basic to Advance
Kubernetes guide: A PRACTICAL GUIDE
Kubernetes networking: Diving Deep into Kubernetes Networking
More on Kubernetes
A) Container orchestration
B) Database management
C) Web hosting
D) Network monitoring
A) The smallest deployable unit in Kubernetes
B) A type of service
C) A command to manage containers
D) A storage volume
A) kubectl scale deployment deployment_name --replicas=N
B) kubectl increase deployment deployment_name
C) kubectl expand deployment deployment_name
D) kubectl modify deployment deployment_name --scale=N
A) An abstraction that defines a logical set of Pods and a policy to access them
B) A command to manage applications
C) A method to deploy containers
D) A storage option for applications
A) kubectl get pods
B) kubectl list pods
C) kubectl show pods
D) kubectl display pods
A) A way to store non-confidential data in key-value pairs
B) A method to store sensitive information
C) A command to configure network settings
D) A tool to manage container images
A) By using PersistentVolume and PersistentVolumeClaim resources
B) By creating a Service
C) By deploying a StatefulSet
D) By scaling a deployment
A) To allow communication between Pods, Services, and external resources
B) To manage database connections
C) To monitor application performance
D) To deploy container images
A) ReplicaSet
B) Service
C) Deployment
D) Node
A) kubectl delete resource_type resource_name
B) kubectl remove resource_name
C) kubectl destroy resource_type
D) kubectl erase resource_name
For more practice questions
Other tools
Ansible for Devops (Chapter 1-4): Server and Configuration Management for human
Ansible: An open-source automation tool for software provisioning, configuration management, and application deployment.
Ansible Guide: Full ansible guide from 'IT Automation Simplified'
More on Ansible
A) Automation of IT processes
B) Manual server configuration
C) Real-time monitoring
D) Database management
A) YAML
B) JSON
C) XML
D) INI
A) ansible-playbook playbook.yml
B) ansible run playbook.yml
C) ansible execute playbook.yml
D) ansible start playbook.yml
A) To define the hosts and groups of hosts managed by Ansible
B) To specify configuration variables
C) To list playbooks
D) To document server settings
A) A reusable unit of code that performs a specific task
B) A command line interface tool
C) A configuration file format
D) A type of inventory
Terraform From Beginners to Master: A comprehensive learning journey covering Terraform, guiding beginners to mastery in infrastructure as code and cloud provisioning.
How To Use Terraform like a Pro: Master advanced Terraform techniques for expert-level infrastructure management.
More on Terraform
A) A container for multiple resources that are used together
B) A type of variable
C) A command for state management
D) A configuration file format
A) Using a state file that tracks the resources
B) By manually creating a backup
C) By using version control systems
D) By deploying the configuration to production
A) terraform plan
B) terraform preview
C) terraform check
D) terraform execute
A) To remove all the resources defined in the Terraform configuration
B) To create a backup of the state file
C) To update the infrastructure
D) To initialize the configuration
A) To display the output values from the Terraform state
B) To configure the provider
C) To initialize the environment
D) To update the configuration files
Jenkins Notes: For continuous integration and for continuous deployment
CI System: Jenkins Continuous Build System
Pipeline Tutorial: Jenkins Pipeline Tutorial
Jenkins 101: Getting Started With Jenkins!
A) Continuous integration and continuous deployment
B) Manual software testing
C) Data analysis
D) Project management
A) A series of automated steps to build, test, and deploy applications
B) A method for manual deployment
C) A database connection tool
D) A network configuration tool
A) By clicking on the job name and selecting 'Build Now'
B) By writing a shell script
C) By configuring a database
D) By creating a new user
Monitoring and alerts: Prometheus/Grafana: installation and configuration
Guide: Prometheus Monitoring Guide by Sysdig
AppInsights
Google StackDriver
Basics of Splunk: This article provides a comprehensive introduction to Splunk, a powerful platform for searching, monitoring, and analyzing machine-generated data.
Mastering Splunk: An Essential Guide
Datadog
A) Searching, monitoring, and analyzing machine-generated data
B) Developing software applications
C) Managing network devices
D) Automating deployment processes
A) Machine-generated data from various sources, including logs and metrics
B) Only structured data from databases
C) User-generated content
D) Real-time video streams
A) Data indexing for fast searching
B) User authentication management
C) Direct API development
D) Container orchestration
A) Through dashboards, charts, and graphs
B) By generating plain text reports only
C) Using command-line interfaces
D) By sending notifications via email
For more terraform questions
The Good Parts of AWS: This is not your typical reference book. It doesn’t cover all of AWS or all its quirks. Instead, we want to help you realize which AWS features you’d be enjoy using.
More on AWS
A) AWS stands for Amazon Web Services. AWS is a platform that provides on-demand resources for hosting web services, storage, networking, databases, and other resources over the internet with a pay-as-you-go pricing.
B) AWS is a type of software used for database management.
C) AWS stands for Advanced Web Solutions, focused on network security.
D) AWS is a platform for building mobile applications.
A) AWS primarily consists of web design tools and analytics software.
B) EC2 – Elastic Compute Cloud, S3 – Simple Storage Service, Route53, EBS – Elastic Block Store, CloudWatch, and Key-Pairs are a few of the components of AWS.
C) The components of AWS are limited to storage solutions only.
D) AWS components include only on-premises servers and storage.
A) Key-pairs are secure login information for your instances/virtual machines. To connect to the instances, we use key-pairs that contain a public key and private key.
B) Key-pairs refer to security groups in AWS that manage access.
C) Key-pairs are backup files for your application data.
D) Key-pairs are user profiles for application access.
A) S3 stands for Simple Storage Service. It is a storage service that provides an interface that you can use to store any amount of data, at any time, from anywhere in the world. With S3, you pay only for what you use, and the payment model is pay-as-you-go.
B) S3 refers to a security protocol used in cloud computing.
C) S3 is a service for building and deploying web applications.
D) S3 is a type of database for structured data storage.
A) The different pricing models for EC2 instances are as follows:
B) EC2 instances only have a single pricing model based on subscription.
C) Pricing models are only available for storage services in AWS.
D) The only pricing model for EC2 instances is pay-per-use.
A) EBS stands for Elastic Block Stores. They are persistent volumes that you can attach to the instances. With EBS volumes, your data will be preserved even when you stop your instances, unlike your instance store volumes where the data is deleted when you stop the instances.
B) EBS volumes are temporary storage solutions that do not retain data.
C) EBS refers to a type of load balancer in AWS.
D) EBS volumes are used solely for database backups.
A) The following are the types of volumes in EBS:
B) There are no types of volumes in EBS; it is a single product.
C) EBS volumes only support one type, which is standard SSD.
D) EBS only offers volumes for archival storage.
A) The following are the types of instances:
B) Instances are categorized only as small, medium, or large.
C) There are only two types of instances: standard and advanced.
D) Types of instances do not exist; all are the same.
A) Auto-scaling allows you to automatically scale up and scale down the number of instances depending on the CPU utilization or memory utilization. There are 2 components in Auto-scaling, they are Auto-scaling groups and Launch Configuration.
B) Auto-scaling is a manual process of managing resources.
C) It is a method of deploying applications without resource management.
D) Auto-scaling only applies to storage resources in AWS.
A) Reserved instances are the instances that you can reserve a fixed capacity of EC2 instances. In reserved instances, you will have to enter into a contract of 1 year or 3 years.
B) Reserved instances are instances that are only available for short-term use.
C) They refer to instances that are permanently free of charge.
D) Reserved instances are specific to storage services only.
For more Practice question
A) To provide cloud computing services
B) To develop desktop applications
C) To host local servers
D) To manage network infrastructure
A) Google App Engine
B) Google Cloud Functions
C) Google Word Processor
D) Google Cloud Storage
A) Scalable object storage for unstructured data
B) Virtual machines
C) Network security
D) User authentication
A) To develop and host web applications
B) To analyze big data
C) To create virtual private networks
D) To manage user accounts