Question: 1 Which IBM Cloud service provides infrastructure as code (IaC) capabilities for deploying and managing cloud resources? A. IBM Cloud Schematics B. IBM Cloud Functions C. IBM Kubernetes Service D. IBM Cloud Foundry Answer: A Explanation: IBM Cloud Schematics is the IBM Cloud service that provides infrastructure as code (IaC) capabilities. It allows you to define and manage your cloud resources using declarative configuration files, enabling consistent and reproducible deployments. Question: 2 Which IBM Cloud service provides capabilities for vulnerability scanning and security posture management? A. IBM Cloud Security Advisor B. IBM Cloud Monitoring with Sysdig C. IBM Cloud Internet Services D. IBM Cloud Databases for PostgreSQL Answer: A Explanation: IBM Cloud Security Advisor is the IBM Cloud service that provides capabilities for vulnerability scanning and security posture management. It helps identify potential vulnerabilities in your cloud resources and provides recommendations for improving your security posture. Question: 3 Which component of the DevSecOps toolchain is responsible for automating the build, test, and deployment processes? A. Continuous Integration (CI) B. Continuous Delivery (CD) C. Continuous Monitoring (CM) D. Continuous Security (CS) Answer: B Explanation: Continuous Delivery (CD) is the component of the DevSecOps toolchain that focuses on automating the build, test, and deployment processes. It ensures that software changes can be reliably and rapidly delivered to production environments. Question: 4 Which component of the DevSecOps toolchain focuses on monitoring and detecting security threats in real-time? A. ContinuousMonitoring (CM) B. Continuous Integration (CI) C. Continuous Delivery (CD) D. Continuous Deployment (CD) Answer: A Explanation: Continuous Monitoring (CM) is the component of the DevSecOps toolchain that focuses on monitoring and detecting security threats in real-time. It involves continuous monitoring of the deployed applications and infrastructure, as well as analyzing logs and metrics to identify and respond to security incidents promptly. Question: 5 What are the DevOps dimensions in IBM Cloud Garage Methodology? A. Test, fail, and learn B. People, process, and technology C. Partners, people, and methodology D. Architecture, infrastructure, and security Answer: B Explanation: In IBM Cloud Garage Methodology, the DevOps dimensions are categorized as people, process, and technology. This highlights the importance of having the right team members, well-defined processes, and appropriate technologies to enable successful DevOps practices. Question: 6 What does the term "shift left" refer to in the context of DevSecOps? A. Moving security practices to the right side of the development timeline B. Delaying security testing until the final stages of development C. Integrating security practices earlier in the development process D. Shifting the responsibility of security solely to the operations team Answer: C Explanation: "Shift left" refers to the practice of integrating security practices earlier in the development process. It involves addressing security concerns and conducting security testing as early as possible, ideally during the design and development phases, rather than deferring them to later stages. Question: 7 Which of the following is a key consideration for day 2 operations with DevSecOps? A. Limiting automation to the development phase B. Ignoring security monitoring and incident response C. Regularly updating security policies and procedures D. Treating infrastructure as a static and unchanging entity Answer: C Explanation: A key consideration for day 2 operations with DevSecOps is regularly updating security policies and procedures. This ensures that security practices remain up to date, align with evolving threats and compliance requirements, and are effectively communicated and followed by the development and operations teams.