Multiple Choice
Configuration management can prevent unauthorized changes to Production. How should the system be configured to prevent unauthorized changes to Production?
A) Admin passwords should be regularly and automatically changed without notification to all IT staff
B) Chaos and disruptions should be deliberately and automatically introduced into production
C) Only a single source should be used to give out information on the status of the system
D) Value stream mapping should be used to identify security leaks and unauthorized persons
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Cloud computing advances have partly enabled DevOps
Q3: Which architecture is a cause of the
Q4: Your team works in three-week iterations and
Q5: Every team needs information. In DevOps, it
Q6: Even more than Agile or Scrum, DevOps
Q7: Commercial off-the-shelf software (COTS) has both advantages
Q8: A team stores not only source code,
Q9: DevOps implies that not only the boundary
Q10: IT work within DevOps is organized differently
Q11: A company decides to do canary releases