Skip to content

Commit

Permalink
prettier autoformatting
Browse files Browse the repository at this point in the history
  • Loading branch information
Ebazhanov committed Oct 19, 2022
1 parent 4ecba3d commit 0d14b16
Show file tree
Hide file tree
Showing 24 changed files with 205 additions and 278 deletions.
174 changes: 88 additions & 86 deletions README.md

Large diffs are not rendered by default.

14 changes: 3 additions & 11 deletions agile-methodologies/agile-methodologies-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -897,38 +897,30 @@ ITIOO isn't a thing, thin verticle slicing is refering to what work you prioriti
- [x] The control chart works best when the tasks that you're tracking are of different sizes.
- [ ] The blue line is the rolling average cycle time.



#### Q123. What does EBM consider in Managerial Decisions?
#### Q123. What does EBM consider in Managerial Decisions?

- [ ] Productivity and ethical concerns
- [x] Circumstance and ethical concerns
- [ ] Circumstances and financial concerns
- [ ] Moral and ethical concerns



#### Q124. Stacey's process complexity model shows us that agile thinking is best _______________.
#### Q124. Stacey's process complexity model shows us that agile thinking is best ******\_\_\_******.

- [ ] When there is high complexity
- [ ] When there is high certainty
- [x] Regardless of complexity or certainty
- [ ] When there is low certainty and complexity


#### Q125. What is a DEEP product backlog?
#### Q125. What is a DEEP product backlog?

- [ ] Detailed Appropriately, Emergent, Elegant & Prioritized
- [ ] Detailed Adequately, Emergent, Estimated & Prioritized
- [ ] Detailed Appropriately, Emanant, Estimated & Prioritized
- [x] Detailed Appropriately, Emergent, Estimated & Prioritized



#### Q126. Which Jira feature provides an overview of multiple projects?

- [x] roll-up boards
- [ ] code integration
- [ ] task automation
- [ ] reporting

12 changes: 6 additions & 6 deletions angular/angular-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -1060,7 +1060,7 @@ export const APP_SETTINGS = new InjectionToken<AppSettings>('app.settings');
- [ ] submit(ngForm.value)
- [ ] submit(FirstName, lastName)

#### Q55. What is the purpose of the ```prelodingStrategy``` property configuration in this router code?
#### Q55. What is the purpose of the `prelodingStrategy` property configuration in this router code?

```
RouterModule.forRoot (
Expand All @@ -1077,12 +1077,12 @@ RouterModule.forRoot (
- [x] It configures the router to immediately load all routes that have a loadChildren property(routes that are typically loaded when requested)
References:
- [Angular Router, PreloadAllModules](https://angular.io/api/router/PreloadAllModules)
- [Route preloading in Angular](https://web.dev/route-preloading-in-angular/)
- [Preloading strategy](https://www.tektutorialshub.com/angular/angular-preloading-strategy/)
- [Custom preloading strategy](https://www.concretepage.com/angular-2/angular-custom-preloading-strategy#Preloading)
- [Preloading strategy, save loading time](https://medium.com/geekculture/preloading-strategy-in-angularsave-loading-time-ca791074fe28)
- [Angular Router, PreloadAllModules](https://angular.io/api/router/PreloadAllModules)
- [Route preloading in Angular](https://web.dev/route-preloading-in-angular/)
- [Preloading strategy](https://www.tektutorialshub.com/angular/angular-preloading-strategy/)
- [Custom preloading strategy](https://www.concretepage.com/angular-2/angular-custom-preloading-strategy#Preloading)
- [Preloading strategy, save loading time](https://medium.com/geekculture/preloading-strategy-in-angularsave-loading-time-ca791074fe28)
#### Q56. What is an alternative way to write this markup to bind the value of the class field `userName` to the `h1` element title property?
Expand Down
2 changes: 1 addition & 1 deletion aws-lambda/aws-lambda-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -369,8 +369,8 @@
- `These events are considered synchronous events. Simply put, it means that when somebody is calling an API Gateway, it will trigger your Lambda function. It's a synchronous event because your Lambda function has to respond to the client directly at the end of its invocation.`
- `You can use Lambda to process event notifications from Amazon Simple Storage Service. Amazon S3 can send an event to a Lambda function when an object is created or deleted.`


#### 52. which is use case of lambda ?

- [ ] Image processing
- [ ] web application
- [x] both
Expand Down
16 changes: 2 additions & 14 deletions aws/aws-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -874,77 +874,65 @@ aws ecs create-service \
- [x] TCP
- [ ] UDP


#### 100. Which is default user in Ec2 Linux-red hat/amazon.

- [ ] root
- [ ] Ec2user
- [x] ec2-user
- [ ] linux



#### Q101. When using Systems Manager, you can create policies through Systems Manager ____.
#### Q101. When using Systems Manager, you can create policies through Systems Manager \_\_\_\_.

- [ ] Policy Manager
- [ ] State Manager
- [x] Documents
- [ ] Inventory


#### Q102. Businesses are increasingly moving towards hybrid cloud environments with automated IT. What Amazon EC2 State Manager feature is particularly useful for these companies?

- [ ] validity
- [x] consistency
- [ ] reliability
- [ ] redundancy


#### Q103. Your DevOps manager has noticed that there is a problem with the installation of the MySQL software in one of your Windows instances and asks you to repair it. What would be the recommended way to fix this issue with AWS Systems Manager?

- [ ] Write a Power Shell script that re-installs the msi file and run it with Run Command.
- [ ] Execute the AWS-ApplyPatchBaseline command.
- [ ] Allow State Manager to automatically fix it on batch.
- [x] Use Run Command to execute the AWS-InstallApplication document.


#### Q104. Within EC2 Systems Manager, you can use Patch ____ to pick the patches you want to install with your instances.
#### Q104. Within EC2 Systems Manager, you can use Patch \_\_\_\_ to pick the patches you want to install with your instances.

- [ ] Levels
- [ ] Manager
- [x] Baselines
- [ ] Policy


#### Q105. When is an AWS Batch job's status runnable?

- [ ] When a submitted job's resources are being deployed
- [ ] When a submitted job has been evaluated
- [x] When a submitted, evaluated job has zero dependencies outstanding
- [ ] When a submitted job is next in the job queue


#### Q106. Which statement regarding AWS Batch automated retries is correct?

- [ ] Each job is provided a single job attempt by default, but a user can modify this to unlimited attempts if desired.
- [ ] Each job is provided a single job attempt by default, but the AWS Batch job scheduler may modify this after evaluating the submitted job.
- [x] Each job is provided a single job attempt by default, but a user can modify this to as many as 10 attempts if desired.
- [ ] Each job is limited to a single attempt before being classified as succeeded or failed.


#### Q107. What AWS Batch job parameter can you specify to prevent an unsuccessful job from being stuck in a loop?

- [x] The duration of job timeout
- [ ] A resource expenditure cap
- [ ] The number of automated job retries
- [ ] An AWS Batch job agent


#### Q108. In which of the following AWS Batch components can a user set a priority level, for time-sensitive or low-priority jobs?


- [ ] Within the job scheduler
- [ ] Within the job itself
- [ ] Within the job definition
- [x] Within a job queue

1 change: 0 additions & 1 deletion c++/c++-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -1408,7 +1408,6 @@ return 0;
- [ ] print("Hello World");
- [ ] Console.WriteLine("Hello World");


#### Q87. How many categories of iterators are there in C++ ?

- [ ] 4
Expand Down
9 changes: 5 additions & 4 deletions c-(programming-language)/c-(programming-language)-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -1257,13 +1257,14 @@ void change(int x,int y)
}
```
-[x] 10,20
-[ ] 10,10
-[ ] 20,20
-[ ] 20,10
- [x] 10,20
- [ ] 10,10
- [ ] 20,20
- [ ] 20,10
**Explanation :** The function "change" will change the value of x and y only within its own scope, so a and is unaffected.
#### Q85. Choose true or false.When variable is created in C, a memory address is assigned to the variable.
- [x] True
- [ ] False
16 changes: 9 additions & 7 deletions css/css-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -2403,20 +2403,22 @@ input.invalid {
- [ ] None of these.

#### Q158. The <link> tag goes inside:

- [ ] the title section
- [ ] the body section
- [x] the head section
- [ ] None of the above

#### Q159. What CSS define in HTML ?

- [ ] How to send HTML elements
- [x] How to display HTML elements
- [ ] How to save HTML elements
- [ ] How to make HTML elements

#### Q160. Which of the following statements is TRUE for CSS?
- [ ] An inline style sheet should be used when a single document has a unique style
- [x] An external style sheet is ideal when the style is applied to many pages
- [ ] Both and b above
- [ ] An external style sheet can be written in HTML
#### Q160. Which of the following statements is TRUE for CSS?

- [ ] An inline style sheet should be used when a single document has a unique style
- [x] An external style sheet is ideal when the style is applied to many pages
- [ ] Both and b above
- [ ] An external style sheet can be written in HTML
20 changes: 4 additions & 16 deletions cybersecurity/cybersecurity-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -921,24 +921,21 @@ What is the next step you should take to best fulfill your responsibilities and
- [ ] brute force attack
- [ ] password spray attack


#### Q119. A data asset register should contain which of the following?

- [ ] the location of the data.
- [ ] The value of the asset.
- [ ] The owner of the asset.
- [x] All of these options.


#### Q120. Once you have confirmed that Burpsuite is intercepting website requests, where can you check to see if you have credentials in cleartext to access the target webpage?

- [ ] Select Go on the Repeater tab
- [ ] See the loopback address and port are on in the Options tab
- [ ] Check the Raw section in the Intercept tab
- [x] Check for a login.php line in the Proxy tab


#### Q121. Threat actors will attempt to find an attack vector on their target by mapping the attack _____.
#### Q121. Threat actors will attempt to find an attack vector on their target by mapping the attack **\_**.

- [x] surface
- [ ] infrastructure
Expand All @@ -947,20 +944,17 @@ What is the next step you should take to best fulfill your responsibilities and

#### Q122. How would an organisation ensure software product support in the event a supplier goes out of business or is sold to a competitor?

- [ ] They could employ the software developers once the supplier organisation has gone out of business.
- [ ] They could ensure support by acquiring the supplier organisation.
- [ ] They could employ the software developers once the supplier organisation has gone out of business.
- [ ] They could ensure support by acquiring the supplier organisation.
- [x] They could ensure support through an escrow agreement.
- [ ] They could reverse engineer the product so that it could be supported in-house.


#### Q123. Which of the following is the security standard that applies to the certification of security controls within products?

- [ ] ISO/IEC 27001.
- [ ] ISO/IEC 9000.
- [x] ISO/IEC 15408.
- [ ] ISO/IEC 13335.


- [ ] ISO/IEC 13335.

#### Q124. What is the main role of the board member known as the information security manager?

Expand All @@ -969,36 +963,30 @@ What is the next step you should take to best fulfill your responsibilities and
- [ ] To have a detailed understanding of the organisation's vulnerabilities.
- [ ] To have a detailed understanding of threats faced by the organisation.


#### Q125. What are the two main approaches used to determine the likelihood of a threat occurring?

- [ ] Qualitative and statistical
- [ ] Statistical and quantitative
- [ ] Statistical and assumptive
- [x] Qualitative and quantitative


#### Q126. Which type of hackers are often organized and funded by a nation's military intelligence or security services, and attempt to gain access to a foreign adversary's state secrets or military intelligence?

- [ ] hacktivists
- [ ] competitors
- [ ] black hat hackers
- [x] state-sponsored hackers


#### Q127. Which of the following methods combines two binary streams to create one new stream that contains hidden information that cannot be retrieved without the other stream that was used to create it?


- [ ] substitution cipher
- [ ] weaponization
- [ ] transposition cipher
- [x] XOR encryption


#### Q128. What is Drupalgeddon?

- [ ] A web app proxy tool
- [ ] A DDoS bot
- [ ] A network packet capturing device
- [x] a SQL injection flaw

2 changes: 1 addition & 1 deletion django/django-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -697,7 +697,7 @@ model=Planet
[Reference](<https://docs.djangoproject.com/en/4.1/ref/urlresolvers/#:~:text=reverse_lazy()&text=It%20is%20useful%20for%20when,a%20generic%20class%2Dbased%20view>)
#### Q77. What python package can be used to edit numbers into more readable form like "1200000" to "1.2 million"?
#### Q77. What python package can be used to edit numbers into more readable form like "1200000" to "1.2 million"?
- [ ] black
- [ ] puffer
Expand Down
17 changes: 5 additions & 12 deletions google-cloud-platform/google-cloud-platform-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -486,7 +486,7 @@
- [ ] Use Cloud Monitoring and install the Ops Agent on the instance running the apache server.
- [ ] Use Cloud Profiler and create an alert.

#### Q61. In Google Kubernetes Engine, "_____" is a term Kubernetes uses to represent pods and controllers.
#### Q61. In Google Kubernetes Engine, "**\_**" is a term Kubernetes uses to represent pods and controllers.

- [ ] masters
- [ ] pools
Expand All @@ -504,56 +504,49 @@ kubectl create deployment app --image=$ImageRepo:$Tag
- [x] It tells the deployment controller which repository to check for a Docker image and what tag to use.
- [ ] It tells the deployment controller which Linux OS type to use when creating pods.



#### Q63. To effectively manage the limited number of IP addresses per node, how many IP addresses per pod does Google recommend?

- [ ] One IP address per pod
- [ ] Three IP addresses per pod
- [ ] Four IP addresses per pod
- [x] Two IP addresses per pod


#### Q64. In Google Kubernetes Engine, _____ are the smallest unit of deployment within a Kubernetes cluster, and our primary Kubernetes building blocks.
#### Q64. In Google Kubernetes Engine, **\_** are the smallest unit of deployment within a Kubernetes cluster, and our primary Kubernetes building blocks.

- [x] pods
- [ ] instances
- [ ] sets
- [ ] containers


#### Q65. Which of the following statements is not a general security guideline for a Google Cloud Platform deployment pipeline?

- [ ] Regularly audit any changes to your IAM policies.
- [x] Integration steps should be able to deploy code.
- [ ] Log everything.
- [ ] Deployment steps should not be able to build code or access your code repository.

#### Q66. In order to allow signed images to be deployed with Google Cloud Platform's binary authorization enabled, you need to create a(n) _____.
#### Q66. In order to allow signed images to be deployed with Google Cloud Platform's binary authorization enabled, you need to create a(n) **\_**.

- [ ] virtual machine
- [ ] alert
- [ ] log
- [x] attestor


#### Q67. Builders in Cloud Build are
#### Q67. Builders in Cloud Build are

- [ ] part of Google's proprietary infrastructure
- [ ] created from Managed Instance Templates
- [x] containers with pre-loaded tools and runtimes
- [ ] virtual machines with pre-loaded tools and runtimes


#### Q68. Which of the following statements about security in the Google Cloud Platform deployment pipeline is false?

- [x] It is pretty standard for developers and QA engineers to be allowed to create new clusters, but not allowed to deploy containers to certain existing clusters.
- [ ] Each employee's access to Google Cloud resources should be based upon what they require to do their job.
- [ ] The exact permissions will vary based upon the needs of the company, and depends upon the number of roles, steps, and environments that exist.
- [ ] Each employee's access to Google Cloud resources should be based on the principle of least privilege.


#### Q69. In order to create and store a key in Google Cloud Platform, you must first create a _____ to hold the key.
#### Q69. In order to create and store a key in Google Cloud Platform, you must first create a **\_** to hold the key.

- [ ] wallet
- [x] keyring
Expand Down
1 change: 0 additions & 1 deletion html/html-quiz.md
Original file line number Diff line number Diff line change
Expand Up @@ -1937,7 +1937,6 @@ A disabled fieldset is unusable and un-clickable. [Source](https://www.w3schools
- [x] <br>
- [ ] <a>


#### Q112. How to display preformatted text in HTML?

- [ ] <p>
Expand Down
Loading

0 comments on commit 0d14b16

Please sign in to comment.