In the context of Incident Management, what is the purpose of a Post-Incident Review (PIR)?
In the context of Incident Management, what is the purpose of a Post-Incident Review (PIR)?A . Assigning blame to individuals responsible for the incidentB . Documenting the incident for legal purposesC . Identifying the root cause of the incident and learning from itD . Informing customers about the resolution of...
When is it appropriate to use alerts in monitoring systems?
When is it appropriate to use alerts in monitoring systems?A . Only during planned maintenance windowsB . Only during business hoursC . When a service violates its defined SLOD . When engineers want to test the alerting systemView AnswerAnswer: C
Which of the following are considered monitoring tools and metrics? (Select all that apply)
Which of the following are considered monitoring tools and metrics? (Select all that apply)A . CPU UsageB . Load Balancer ConfigurationC . Number of Employees in the OrganizationD . Network LatencyView AnswerAnswer: ABD
What are the three components of the SRE Error Budget Policy? (Select all that apply)
What are the three components of the SRE Error Budget Policy? (Select all that apply)A . Service Level Objectives (SLOs)B . Service Level Agreements (SLAs)C . Service Level Indicators (SLIs)D . Service Level Targets (SLTs)View AnswerAnswer: ABC
What is the definition of "high availability" in the context of service architecture components?
What is the definition of "high availability" in the context of service architecture components?A . The ability of a system to handle an increasing number of usersB . The capability of a system to recover from failures and continue functioningC . The practice of running multiple instances of a service...
Which troubleshooting technique involves isolating the problematic component by dividing the system in half and checking each part?
Which troubleshooting technique involves isolating the problematic component by dividing the system in half and checking each part?A . Binary searchB . Active probingC . TracerouteD . Post-mortem analysisView AnswerAnswer: A
What is the key advantage of canary deployment compared to other zero downtime deployment models?
What is the key advantage of canary deployment compared to other zero downtime deployment models?A . It allows for instant rollbacks in case of issuesB . It requires no additional infrastructure setupC . It eliminates the need for automated testingD . It ensures that all users experience the new version...
Which of the following is a key tenet of Incident Management?
Which of the following is a key tenet of Incident Management?A . Minimizing customer communication during incidentsB . Focusing on quick fixes rather than long-term solutionsC . Prioritizing incidents based on the impact on the organizationD . Assigning blame to individuals responsible for incidentsView AnswerAnswer: C
Which deployment strategy allows a new version of software to be released to a small subset of users before a full rollout?
Which deployment strategy allows a new version of software to be released to a small subset of users before a full rollout?A . Canary deploymentB . Blue-green deploymentC . Rolling deploymentD . Feature-flag deploymentView AnswerAnswer: A
Which of the following is a recommended practice for securing applications on IBM Cloud?
Which of the following is a recommended practice for securing applications on IBM Cloud?A . Storing all sensitive data in plain textB . Using a single shared account for all team membersC . Implementing multi-factor authentication (MFA)D . Allowing anonymous access to resourcesView AnswerAnswer: C