Home devopsquiz devopsquiz Check Your readiness for Mid Level any DevOps Interview . Name Email What do Amazon RDS services stand for? Elastic Compute Cloud Remote Database Services Relational Database Services Remote Diagram Services None Given the following IAM policy applied to users, what is its purpose? {"Version": "2012-10-17","Statement": {"Effect": "Allow","Action": "iam:*","Resource": "*"}} It allows access to all IAM accounts to the AWS console. It allows users to perform all possible IAM actions. It allows users to administer all AWS resources. It grants full access to the AWS web console. None In the context of AWS's global infrastructure, what does the "shared responsibility model" imply? You are responsible for any firewall rule you configure through VPC or data you place in S3 buckets and any patching action on EC2 instances, while Amazon ensures all data centers and access to them are compliant with modern security standards. You are responsible for any data placed in S3 buckets or OS patching actions or application access, while Amazon ensures compliance with modern security standards for data centers and firewall rules VPC. You are responsible for any data placed in S3 buckets or Amazon Glacier, while Amazon takes care of all other AWS-related security aspects. You are not responsible for security configurations because Amazon's default configurations, being the best in its class, take care of all security aspects. None What do you expect when Puppet executes this module on a node? Puppet will look for the file "wildcard.mydomain.com.pem" in /etc/haproxy/ssl/, and if it does not exist, it will copy it from the puppet server ensuring both its "owner" and "group" are "root". Puppet will look for the file "wildcard.mydomain.com.pem" in /etc/haproxy/ssl and if it does not exist, it will copy and store it on the puppet server ensuring both its "owner" and "group" are "root Puppet will replace any file in /etc/haproxy/ssl with a text file "This file is managed by puppet!". Puppet will look for the node on which it is executed using the user and "group root", and if it finds the "wildcard.mydomain.com.pem" folder, it will replace its contents with those from the puppet server None When talking about puppet and orchestration systems, what do you mean by idempotence and declarative language? You want a system that executes a configuration to change its state to ensure optimal configurations. You want a system that operates under the same conditions and records all possible outcomes of its actions for later data analysis. You want a system that executes the same configuration (which only describes the outcome) and achieves the same result each time it is executed. You want a system that uses easily readable code in its module or playbook declarations for every configuration you are trying to achieve. None How does Ansible connect to client nodes? Via HTTP. Via SSH. Via a proprietary new protocol that requires installing an Ansible client on the nodes. Via TCP port 5432. None What will be the result of the following Ansible command? ansible webservers -m yum -a <span class="hljs-string">"name=httpd state=installed"</span> It ensures that the http user is created using yum. It ensures that the apache service is operational on the client using yum. It ensures that Ansible is functional on the targeted system using SSH. It ensures that the yum command is executed on the client using the http system user. None How do you know if you are doing continuous integration correctly in your environment/project? (Choose the most complete answer) You maintain a single source repository, do a lot of automated build testing, and manually test each build so nothing goes into production without your knowledge. You have a CI system that automatically does everything you need. You maintain a single source repository, automate the build making it self-testing, and automatically test everything in a clone of the production environment. Everyone can see what's happening, and everyone gets notified when a build fails; any failed build is fixed immediately. Every build that passes all automated tests is sent directly to production, and the team is informed of these deployments. None Give an example of a best practice for a recent Jenkins installation: Change the administrator's password and username as well as the default theme. Implement a form of security to restrict access to the Jenkins instance. Remove the default installed plugins. Delete any generic user that might have been created following the installation. None Given the following Apache configuration on a virtual host, choose the correct answer: ...Order deny,allowDeny from allAllow from 192.168.1.129... All hosts are denied because the statement "Deny from all" has priority over "Allow from...". Only the host with the IP address 192.168.1.129 is allowed access. All hosts except the one with the IP address 192.168.1.129 are allowed access. The statements are not part of standard Apache configurations and may result in errors. None Good Luck Time's up