Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save devenes/636d6cf0efac98ab6518fe97bcfb3b20 to your computer and use it in GitHub Desktop.
Save devenes/636d6cf0efac98ab6518fe97bcfb3b20 to your computer and use it in GitHub Desktop.
Hybrid Cloud Conference - Backend Services for Containers Practice Questions

Hybrid Cloud Conference - Backend Services for Containers

Practice Questions

  • 1 Who is the primary audience for the Make Your Solution into a Backend Service on OpenShift® track?

    • Independent Software Vendors (ISVs)
  • 2 Which of these is not a goal of the Make Your Solution into a Backend Service on OpenShift® track?

    • Incorporate metering and billing into the service
  • 3 Which of these topics is not covered in the Make Your Solution into a Backend Service on OpenShift® track?

    • How to control which applications can be deployed to a cluster
  • 4 Which of the following standards are required for building a universal application image (UAI)?

    • All of the above
  • 5 What is the primary purpose of the GitHub web hook created by the Cloud-Native Toolkit?

    • Triggers the current pipeline to run
  • 6 Which command creates and configures your Red Hat OpenShift project for use with the Cloud-Native Toolkit?

    • oc sync
  • 7 What is the recommended way to provide service credentials to your deployed application?

    • Secrets
  • 8 What tool from the Cloud-Native Toolkit performs code coverage tests on application source?

    • SonarQube
  • 9 What is the primary purpose for security context constraints (SCCs)?

    • Enables OpenShift cluster administrators the ability to authorize container permissions
  • 10 How are security context constraints (SCCs) associated with deployments?

    • Via an RBAC service account specified by the Pod resource
  • 11 How do deployments request additional permissions?

    • With a Security Context specified in the deployment manifest
  • 12 Which of the following is NOT an SCC permission type?

    • Projects
  • 13 What types of permissions can be requested with a Security Context?

    • All of the above
  • 14 Which statement is not true about operators?

    • An operator runs in the control plane
  • 15 Which technology is not one typically used to implement operators?

    • Terraform
  • 16 Which capability is not one of the Operator Capability Levels?

    • Machine learning
  • 17 Which component is the heart of an operator's structure?

    • Controller
  • 18 Which component tells the operator to reconcile?

    • Controller manager

Reference:

Hybrid Cloud Conference - Backend Services for Containers

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment