In the context of Incident Management, what is the purpose of a Post-Incident Review (PIR)?

In the context of Incident Management, what is the purpose of a Post-Incident Review (PIR)?A . Assigning blame to individuals responsible for the incidentB . Documenting the incident for legal purposesC . Identifying the root cause of the incident and learning from itD . Informing customers about the resolution of...

April 4, 2024 No Comments READ MORE +

When is it appropriate to use alerts in monitoring systems?

When is it appropriate to use alerts in monitoring systems?A . Only during planned maintenance windowsB . Only during business hoursC . When a service violates its defined SLOD . When engineers want to test the alerting systemView AnswerAnswer: C

April 3, 2024 No Comments READ MORE +

Which of the following are considered monitoring tools and metrics? (Select all that apply)

Which of the following are considered monitoring tools and metrics? (Select all that apply)A . CPU UsageB . Load Balancer ConfigurationC . Number of Employees in the OrganizationD . Network LatencyView AnswerAnswer: ABD

April 3, 2024 No Comments READ MORE +

What are the three components of the SRE Error Budget Policy? (Select all that apply)

What are the three components of the SRE Error Budget Policy? (Select all that apply)A . Service Level Objectives (SLOs)B . Service Level Agreements (SLAs)C . Service Level Indicators (SLIs)D . Service Level Targets (SLTs)View AnswerAnswer: ABC

April 3, 2024 No Comments READ MORE +

What is the definition of "high availability" in the context of service architecture components?

What is the definition of "high availability" in the context of service architecture components?A . The ability of a system to handle an increasing number of usersB . The capability of a system to recover from failures and continue functioningC . The practice of running multiple instances of a service...

April 2, 2024 No Comments READ MORE +

Which troubleshooting technique involves isolating the problematic component by dividing the system in half and checking each part?

Which troubleshooting technique involves isolating the problematic component by dividing the system in half and checking each part?A . Binary searchB . Active probingC . TracerouteD . Post-mortem analysisView AnswerAnswer: A

April 2, 2024 No Comments READ MORE +

What is the key advantage of canary deployment compared to other zero downtime deployment models?

What is the key advantage of canary deployment compared to other zero downtime deployment models?A . It allows for instant rollbacks in case of issuesB . It requires no additional infrastructure setupC . It eliminates the need for automated testingD . It ensures that all users experience the new version...

April 1, 2024 No Comments READ MORE +

Which of the following is a key tenet of Incident Management?

Which of the following is a key tenet of Incident Management?A . Minimizing customer communication during incidentsB . Focusing on quick fixes rather than long-term solutionsC . Prioritizing incidents based on the impact on the organizationD . Assigning blame to individuals responsible for incidentsView AnswerAnswer: C

April 1, 2024 No Comments READ MORE +

Which deployment strategy allows a new version of software to be released to a small subset of users before a full rollout?

Which deployment strategy allows a new version of software to be released to a small subset of users before a full rollout?A . Canary deploymentB . Blue-green deploymentC . Rolling deploymentD . Feature-flag deploymentView AnswerAnswer: A

April 1, 2024 No Comments READ MORE +

Which of the following is a recommended practice for securing applications on IBM Cloud?

Which of the following is a recommended practice for securing applications on IBM Cloud?A . Storing all sensitive data in plain textB . Using a single shared account for all team membersC . Implementing multi-factor authentication (MFA)D . Allowing anonymous access to resourcesView AnswerAnswer: C

April 1, 2024 No Comments READ MORE +