×

Which action should you take?

Question 1: You are responsible for managing secrets and sensitive configuration data within your configuration management system. How do you ensure the security and confidentiality of this information while maintaining ease of use and accessibility for authorized personnel?

Which action should you take?

Choose only one option

Question 2: You are responsible for monitoring a critical production system that handles sensitive customer data. How do you balance the need for comprehensive monitoring with the importance of data privacy and security?

Which action should you take?

Choose only one option

Question 3: You've deployed an application to AWS using EC2 instances. You're now seeing intermittent spikes in traffic that cause performance issues. What service could you use to automatically scale your application based on demand?

Which action should you take?

Choose only one option

Question 4: Your team is adopting a new CI/CD tool. How do you ensure security is integrated into the pipeline from the start?

Which action should you take?

Choose only one option

Question 5: A new feature deployment caused a critical production outage. What is your immediate action?

Which action should you take?

Choose only one option

Question 6: You are building a Docker image for your application, but the image size is very large, impacting build and deployment times. How do you optimize the image size without sacrificing functionality?

Which action should you take?

Choose only one option