OpenShift Multiple-Choice Questions (MCQs)

OpenShift is a hybrid cloud platform as a service built around Linux containers orchestrated and managed by Kubernetes on the foundation of Red Hat Enterprise Linux. It was developed by Red Hat.

OpenShift MCQs: This section contains multiple-choice questions and answers on the various topics of OpenShift. Practice these MCQs to test and enhance your skills on OpenShift.

List of OpenShift MCQs

1. OpenShift is a ____.

  1. Content-distributing platform
  2. Data Harvesting platform
  3. Utility platform
  4. Cloud development platform

Answer: D) Cloud development platform

Explanation:

OpenShift is a cloud development Platform as a Service (PaaS).

Discuss this Question


2. OpenShift is developed by ____.

  1. Apache
  2. Microsoft
  3. Red hat
  4. IBM

Answer: C) Red hat

Explanation:

OpenShift is developed by red hat.

Discuss this Question


3. Is OpenShift an open-source development platform?

  1. Yes
  2. No

Answer: A) Yes

Explanation:

Yes, OpenShift is an open-source development platform.

Discuss this Question


4. OpenShift is incapable of managing applications written in different languages?

  1. Yes
  2. No

Answer: B) No

Explanation:

OpenShift can manage applications developed in a variety of languages, including Node.js, Ruby, Python, Perl, and Java.

Discuss this Question


5. ____ is the production of a virtual system rather than a real or actual version of anything, beginning with the system, storage, or operating system.

  1. Segmentation
  2. Cloud Computing
  3. Virtualization

Answer: C) Virtualization

Explanation:

Virtualization is the production of a virtual system rather than a real or actual version of anything, beginning with the system, storage, or operating system.

Discuss this Question


6. Which of the following types of virtualizations is the process of combining many storage devices into a single storage device?

  1. Storage virtualization
  2. Data virtualization
  3. Network virtualization
  4. Server virtualization

Answer: A) Storage virtualization

Explanation:

Storage virtualization is the process of combining many storage devices into a single storage device.

Discuss this Question


7. Which of the following types of virtualization methods virtualizes server-related resources such as the physical server, process, and operating system?

  1. Application virtualization
  2. Data virtualization
  3. Network virtualization
  4. Server virtualization

Answer: D) Server virtualization

Explanation:

The server virtualization method virtualizes server-related resources such as the physical server, process, and operating system.

Discuss this Question


8. Open-shift supports how many kinds of platforms for the developers and users?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

OpenShift primarily offers three types of platforms for developers and consumers:

  • IAAS
  • SAAS
  • PAAS

Discuss this Question


9. In which of the following platform does the service provider delivers hardware-level virtual machines with certain pre-defined virtual hardware configuration?

  1. IAAS
  2. SAAS
  3. PAAS

Answer: A) IAAS

Explanation:

In Infrastructure as a Service (IAAS) the service provider delivers hardware-level virtual machines with certain pre-defined virtual hardware configurations.

Discuss this Question


10. OpenShift container platform was formally known as ____.

  1. OpenShift Origin
  2. OpenShift Online
  3. OpenShift Enterprise

Answer: C) OpenShift Enterprise

Explanation:

OpenShift container platform was formally known as OpenShift Enterprises.

Discuss this Question


11. OpenShift container platform is available in how many package levels?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

OpenShift container platform is available in two package levels.

  • OpenShift Container Local
  • OpenShift Container Lab

Discuss this Question


12. Which container platform is intended for developers who want to deploy and test apps locally?

  1. OpenShift Container Local
  2. OpenShift Container Lab

Answer: A) OpenShift Container Local

Explanation:

OpenShift Container Local platform is intended for developers who want to deploy and test apps locally.

Discuss this Question


13. Which component in OpenShift is in charge of infrastructure deployment and management?

  1. Container
  2. Kubernetes
  3. Docker

Answer: B) Kubernetes

Explanation:

Kubernetes is in charge of infrastructure deployment and management.

Discuss this Question


14. Which of the following is the key component of Kubernetes master?

  1. Scheduler
  2. Controller manager
  3. API server
  4. Etcd

Answer: A) Scheduler

Explanation:

The scheduler is the key component of Kubernetes master.

Discuss this Question


15. Which of the following is not the Kubernetes master machine component?

  1. Scheduler
  2. Controller manager
  3. API server
  4. Docker

Answer: D) Docker

Explanation:

Kubernetes master machine components are

  • Scheduler
  • Controller manager
  • API server
  • Etcd

Whereas Kubernetes node server components are:

  • Docker
  • Kubelet Service
  • Kubernetes Proxy service

Therefore, Docker is not a part of Kubernetes node server components.

Discuss this Question


16. Red Hat's ____ is a built-in storage unit for storing Docker images.

  1. OpenShift Origin
  2. OpenShift Online
  3. OpenShift Enterprise
  4. OpenShift container registry

Answer: D) OpenShift container registry

Explanation:

Red Hat's OpenShift container registry is a built-in storage unit for storing Docker images.

Discuss this Question


17. When the Docker image is deployed on the OpenShift cluster, ____ is built.

  1. Container
  2. Unit
  3. Module
  4. Images

Answer: A) Container

Explanation:

When the Docker image is deployed on the OpenShift cluster, the container is built.

Discuss this Question


18. One container can have a single image?

  1. Yes
  2. No

Answer: B) No

Explanation:

No, one container can contain several images, and all containers operating on the cluster node are managed by OpenShift Kubernetes.

Discuss this Question


19. A ____ is a group of containers and their storage within an OpenShift (Kubernetes) cluster node.

  1. Container
  2. Module
  3. Pod
  4. Unit

Answer: C) Pod

Explanation:

A pod is a group of containers and their storage within an OpenShift (Kubernetes) cluster node.

Discuss this Question


20. How many types of pods are there?

  1. 2
  2. 3
  3. 4
  4. 5

Answer: A) 2

Explanation:

In general, we have two sorts of pods: single-container pods and multi-container pods.

Discuss this Question


21. ____ in OpenShift is the process of converting images into containers.

  1. Build
  2. Route
  3. Deploy

Answer: A) Build

Explanation:

Build in OpenShift is the process of converting images into containers.

Discuss this Question


22. ____ is a means of exposing the service to the outside world in OpenShift by generating and setting externally available hostnames.

  1. Packet Switching
  2. Gateway
  3. Routing
  4. Networking

Answer: C) Routing

Explanation:

Routing is a means of exposing the service to the outside world in OpenShift by generating and setting externally available hostnames.

Discuss this Question


23. Which feature of OpenShift master is used to validate a user?

  1. Authorization
  2. Authentication

Answer: A) Authorization

Explanation:

Authorization is a feature of OpenShift master that is used to validate a user.

Discuss this Question


24. OpenShift has how many sorts of medians for creating and deploying applications?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

OpenShift has two sorts of medians for creating and deploying applications: GUI and CLI.

Discuss this Question


25. Which command Handles a Kubernetes deployment or an OpenShift deployment?

  1. Deploy
  2. Rollout
  3. Rollback
  4. Build

Answer: B) Rollout

Explanation:

The rollout command handles a Kubernetes deployment or an OpenShift deployment.

Discuss this Question


26. Which command View, start, cancel, or retry a deployment?

  1. Deploy
  2. Rollout
  3. Rollback
  4. Build

Answer: A) Deploy

Explanation:

Deploy command view, start, cancel, or retry a deployment.

Discuss this Question


27. Which of the following command revert a section of an application to its prior state?

  1. Whoami
  2. Cancel
  3. Rollback
  4. Build

Answer: C) Rollback

Explanation:

The rollback command reverts a section of an application to its prior state.

Discuss this Question


28. Which of the following command create a fresh build setup?

  1. Build
  2. New-build
  3. Create-build
  4. Start-build

Answer: B) New-build

Explanation:

New-build command is used to create a fresh-build setup.

Discuss this Question


29. In how many ways you can create a new application, in OpenShift?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

In OpenShift, there are three methods of creating a new application:

  • From a source code
  • From an image
  • From a template

Discuss this Question


30. In OpenShift, how many types of build strategies are there?

  1. 4
  2. 3
  3. 2
  4. 1

Answer: A) 4

Explanation:

In OpenShift, there are four types of build strategies:

  • Source-to-image strategy
  • Docker strategy
  • Custom strategy
  • Pipeline strategy

Discuss this Question


31. In which of the following build strategy approach, the actual code is downloaded into the container first, and then compiled within it? The compiled code is deployed within the same container, and the image is created from it.

  1. Source-to-image strategy
  2. Docker strategy
  3. Custom strategy
  4. Pipeline strategy

Answer: A) Source-to-image strategy

Explanation:

Source-to-image build strategy approach, the actual code is downloaded into the container first, and then compiled within it. The compiled code is deployed within the same container, and the image is created from it.

Discuss this Question


32. In which of the following build strategy OpenShift builds the image with Dockerfile and then upload it to the Docker registry?

  1. Source-to-image strategy
  2. Docker strategy
  3. Custom strategy
  4. Pipeline strategy

Answer: B) Docker strategy

Explanation:

In the Docker build strategy OpenShift builds the image with Dockerfile and then uploads it to the Docker registry.

Discuss this Question


33. ____ strategy is used to develop custom pipelines.

  1. Source-to-image strategy
  2. Docker strategy
  3. Custom strategy
  4. Pipeline strategy

Answer: D) Pipeline strategy

Explanation:

Pipeline strategy is used to develop custom pipelines.

Discuss this Question


34. Which command is used to end the current server session?

  1. Cancel
  2. Moveout
  3. Logout

Answer: C) Logout

Explanation:

The logout command is used to end the current server session.

Discuss this Question


35. Which command is used to cancel running/pending/new builds?

  1. Delete-builds
  2. Del-builds
  3. Remove-builds
  4. Cancel-builds

Answer: D) Cancel-builds

Explanation:

Cancel-builds command is used to cancel running/pending/new builds.

Discuss this Question


36. Which command helps us to return the information about the present session?

  1. Whoami
  2. Oauth
  3. Present-session
  4. Current

Answer: A) Whoami

Explanation:

Whoami command helps us to return the information about the present session.

Discuss this Question


37. What is the other name for autoscaling in OpenShift applications?

  1. App scaling
  2. Pod autoscaling
  3. Pattern autoscaling
  4. Source autoscaling

Answer: B) Pod autoscaling

Explanation:

In the OpenShift application, autoscaling is also known as pod autoscaling.

Discuss this Question


38. How many types of application scaling are there in OpenShift?

  1. 4
  2. 5
  3. 3
  4. 2

Answer: D) 2

Explanation:

There are two types of application scaling:

  • Vertical scaling
  • Horizontal scaling

Discuss this Question


39. ____ scaling is the process of adding more and more power to a single computer, which includes adding additional CPU and hard drive space.

  1. Vertical scaling
  2. Horizontal scaling

Answer: A) Vertical scaling

Explanation:

Vertical scaling is the process of adding more and more power to a single computer, which includes adding additional CPU and hard drive space.

Discuss this Question


40. Which form of scalability is useful when more requests must be handled by expanding the number of machines?

  1. Vertical scaling
  2. Horizontal scaling

Answer: B) Horizontal scaling

Explanation:

Horizontal scaling form of scalability is useful when more requests must be handled by expanding the number of machines.

Discuss this Question


41. A ____ strategy is utilized for incremental updates or deployment.

  1. Recreate strategy
  2. Rolling strategy
  3. Custom strategy

Answer: B) Rolling strategy

Explanation:

A rolling strategy is utilized for incremental updates or deployment.

Discuss this Question


42. Which deployment strategy includes some of the core characteristics of the rolling deployment strategy, as well as the life-cycle hook?

  1. Recreate strategy
  2. Custom strategy
  3. Incremental

Answer: A) Recreate strategy

Explanation:

Recreate deployment strategy includes some of the core characteristics of the rolling deployment strategy, as well as the life-cycle hook.

Discuss this Question


43. Which of the following is a fundamental aspect of Kubernetes and is in charge of ensuring that the given number of pod replicas are operational at all times?

  1. Docker config
  2. Config
  3. Replica set
  4. Replication Controller

Answer: D) Replication Controller

Explanation:

The Replication Controller is a fundamental aspect of Kubernetes that is in charge of controlling the pod lifetime. It is in charge of ensuring that the given number of pod replicas are operational at all times.

Discuss this Question


44. Which of the following security constraints component is mostly used for pod restriction, which implies that it establishes the constraints for a pod, such as what actions it may execute and what all items in the cluster it can access?

  1. Security content constraints (SCC)
  2. Service Account

Answer: A) Security content constraints (SCC)

Explanation:

The security content constraints (SCC) component is mostly used for pod restriction, which implies that it establishes the constraints for a pod, such as what actions it may execute and what all items in the cluster it can access.

Discuss this Question


45. ____ groups are regular Linux groups.

  1. fsGroups
  2. RunAsUser
  3. Supplemental groups
  4. seLinuxOptions

Answer: C) Supplemental groups

Explanation:

Supplemental groups are regular Linux groups.

Discuss this Question


46. Which of the following is a file system group that is used to add container supplementary groups?

  1. fsGroups
  2. RunAsUser
  3. seLinuxOptions

Answer: A) fsGroups

Explanation:

fsGroup is a file system group that is used to add container supplementary groups.

Discuss this Question


47. What do you mean by S2I?

  1. System to image
  2. System TWO Image
  3. Source to image

Answer: C) Source to image

Explanation:

S2I Stands for source-to-image strategy.

Discuss this Question


48. Which of the following is a tool for making repetitive container pictures?

  1. Source to image
  2. Docker build
  3. Custom build

Answer: A) Source to image

Explanation:

The source of the image is a tool for making repetitive container pictures.

Discuss this Question


49. The ____ build strategy allows developers to select a customized builder image that will be in charge of the whole build process.

  1. Source to image
  2. Docker build
  3. Custom build

Answer: C) Custom build

Explanation:

The custom build strategy allows developers to select a customized builder image that will be in charge of the whole build process.

Discuss this Question


50. Which of the following is the focal point of starting a new application and we can configure the environment required to run all applications?

  1. Image
  2. Builds
  3. Cartridge

Answer: C) Cartridge

Explanation:

Cartridge is the focal point of starting a new application and we can configure the environment required to run all applications.

Discuss this Question


51. To test the new version, a ____ deployment is utilized.

  1. Canary
  2. Blue/green
  3. Rolling

Answer: A) Canary

Explanation:

To test the new version, a canary deployment is utilized.

Discuss this Question


52. Setup scripts and binding code can be reorganized using which type of containers?

  1. Regular container
  2. Init container

Answer: B) Init container

Explanation:

Setup scripts and binding code can be reorganized using Init containers.

Discuss this Question


53. Is a replica set and a replication controller the same?

  1. Yes
  2. No

Answer: B) No

Explanation:

The distinction between a replica set and a replication controller is that a replica set supports set-based selector requirements, but a replication controller only provides equality-based selector requirements.

Discuss this Question


54. Is the Jobs and Replication controllers have the same task to perform?

  1. Yes
  2. No

Answer: B) No

Explanation:

The distinction between a job and a replication controller is that replication controllers are intended for continuous-running pods, whilst jobs are intended for one-time pods.

Discuss this Question


55. Which of the following template implements sticky sessions?

  1. Regular router
  2. HAProxy
  3. Source load balancer

Answer: B) HAProxy

Explanation:

The HAProxy template implements sticky sessions.

Discuss this Question


56. What do you mean by sticky session?

  1. Sticky sessions ensure that all traffic generated by a user's session is routed to the same pod.
  2. Sticky sessions ensure that all traffic generated by a user's session is routed to a different pod.

Answer: A) Sticky sessions ensure that all traffic generated by a user's session is routed to the same pod.

Explanation:

Sticky sessions ensure that all traffic generated by a user's session is routed to the same pod.

Discuss this Question


57. How many types of secure TLS termination are there in OpenShift?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

There are three types of secure TLS termination:

  • Edge termination
  • Re-encryption
  • Pass-through

Discuss this Question


58. Do we require any key or certificates with Pass-through termination?

  1. Yes
  2. No

Answer: B) No

Explanation:

No, with Pass-through termination no key or certificate is required.

Discuss this Question


59. Which termination sends encrypted traffic directly to the destination without requiring TLS termination from the router?

  1. Edge termination
  2. Re-encryption
  3. Pass-through

Answer: C) Pass-through

Explanation:

Passthrough termination sends encrypted traffic directly to the destination without requiring TLS termination from the router.

Discuss this Question


60. Deleting the service bindings is known as ____.

  1. Unbinding
  2. Unchain
  3. Undo
  4. Unknot

Answer: A) Unbinding

Explanation:

Deleting the service bindings is known as unbinding.

Discuss this Question


61. A ____ is a method for storing and retrieving binary signature blobs.

  1. Multiple Signature
  2. Parallel Signature
  3. Signature transport

Answer: C) Signature transport

Explanation:

A signature transport is a method for storing and retrieving binary signature blobs.

Discuss this Question


62. How many types of signature transports are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

There are two types of signature transports:

  • atomic
  • docker

Discuss this Question





Comments and Discussions!

Load comments ↻






Copyright © 2024 www.includehelp.com. All rights reserved.