Skip to content

Commit fcf6ccc

Browse files
committed
updated assessment to fix acrolinx score
1 parent 246543f commit fcf6ccc

1 file changed

Lines changed: 11 additions & 11 deletions

File tree

learn-pr/wwl-data-ai/configure-apps-azure-kubernetes-service/6-module-assessment.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,45 +13,45 @@ durationInMinutes: 5
1313
content: |
1414
quiz:
1515
questions:
16-
- content: "You need to store a database connection string for your application running on AKS. The connection string contains a password and should not be visible in your source code repository. Which Kubernetes resource should you use?"
16+
- content: "You need to store a database connection string for your application running on AKS. The connection string contains a password and shouldn't be visible in your source code repository. Which Kubernetes resource should you use?"
1717
choices:
1818
- content: "ConfigMap, because it stores configuration data"
1919
isCorrect: false
20-
explanation: "ConfigMaps are designed for non-sensitive configuration. While they keep data out of container images, they should not be used for credentials or passwords."
20+
explanation: "ConfigMaps are designed for nonsensitive configuration. While they keep data out of container images, they shouldn't be used for credentials or passwords."
2121
- content: "Secret, because it stores sensitive values and keeps credentials out of source control"
2222
isCorrect: true
2323
explanation: "Secrets are the correct choice for storing sensitive values like connection strings with passwords. They keep credentials out of source control and can be protected with RBAC policies."
2424
- content: "PersistentVolumeClaim, because it provides storage for application data"
2525
isCorrect: false
2626
explanation: "PersistentVolumeClaims provide durable filesystem storage, not a mechanism for storing and injecting credentials into Pods."
27-
- content: "Your AI application reads feature flags and service endpoints from environment variables. You want to update these settings without rebuilding your container image. How should you inject these non-sensitive values into your Pods?"
27+
- content: "Your AI application reads feature flags and service endpoints from environment variables. You want to update these settings without rebuilding your container image. How should you inject these nonsensitive values into your Pods?"
2828
choices:
2929
- content: "Create a ConfigMap with the settings and reference the keys using configMapKeyRef in the Deployment"
3030
isCorrect: true
31-
explanation: "ConfigMaps are designed for non-sensitive configuration. Using configMapKeyRef lets you inject values as environment variables and update them without rebuilding images."
31+
explanation: "ConfigMaps are designed for nonsensitive configuration. Using configMapKeyRef lets you inject values as environment variables and update them without rebuilding images."
3232
- content: "Store the values in a Secret and mount it as a volume"
3333
isCorrect: false
34-
explanation: "While this would work technically, Secrets are intended for sensitive data. ConfigMaps are the appropriate resource for non-sensitive configuration like feature flags."
34+
explanation: "While this would work technically, Secrets are intended for sensitive data. ConfigMaps are the appropriate resource for nonsensitive configuration like feature flags."
3535
- content: "Hardcode the values in the Deployment manifest and update the manifest when settings change"
3636
isCorrect: false
3737
explanation: "Hardcoding values in the Deployment manifest couples configuration to the deployment definition. ConfigMaps let you change settings independently of the Deployment."
3838
- content: "You create a PersistentVolumeClaim in your AKS cluster. What happens when you apply the PVC manifest?"
3939
choices:
4040
- content: "You must manually create an Azure Disk in the Azure portal before the PVC can bind"
4141
isCorrect: false
42-
explanation: "AKS StorageClasses handle dynamic provisioning automatically. You do not need to manually create Azure storage resources."
42+
explanation: "AKS StorageClasses handle dynamic provisioning automatically. You don't need to manually create Azure storage resources."
4343
- content: "AKS uses the specified StorageClass to automatically provision Azure storage that backs the PVC"
4444
isCorrect: true
45-
explanation: "AKS includes pre-configured StorageClasses that dynamically provision Azure Disk or Azure Files resources when you create a PVC. No manual storage creation is required."
45+
explanation: "AKS includes preconfigured StorageClasses that dynamically provision Azure Disk or Azure Files resources when you create a PVC. No manual storage creation is required."
4646
- content: "The PVC remains unbound until you create a matching PersistentVolume manifest"
4747
isCorrect: false
48-
explanation: "With dynamic provisioning through StorageClasses, you do not need to manually create PersistentVolume manifests. AKS creates them automatically."
48+
explanation: "With dynamic provisioning through StorageClasses, you don't need to manually create PersistentVolume manifests. AKS creates them automatically."
4949
- content: "Your application needs to access API keys stored in a Kubernetes Secret. You want to make the keys available as environment variables in the container. Which field should you use in the Deployment manifest to reference the Secret?"
5050
choices:
5151
- content: "valueFrom with secretKeyRef"
5252
isCorrect: true
5353
explanation: "The valueFrom field with secretKeyRef is the correct way to inject Secret values as environment variables. This resolves the Secret key at Pod start time."
54-
- content: "volumes with secret type"
54+
- content: "Volumes with secret type"
5555
isCorrect: false
5656
explanation: "This approach mounts the Secret as files in the container filesystem, not as environment variables. Use this when your application reads secrets from files."
5757
- content: "configMapKeyRef pointing to the Secret name"
@@ -61,10 +61,10 @@ quiz:
6161
choices:
6262
- content: "Mount the ConfigMap as environment variables because all applications can read environment variables"
6363
isCorrect: false
64-
explanation: "While applications can read environment variables, this approach does not provide a JSON file on disk. The application expects a file, not environment variables."
64+
explanation: "While applications can read environment variables, this approach doesn't provide a JSON file on disk. The application expects a file, not environment variables."
6565
- content: "Mount the ConfigMap as files using a volume so the JSON file appears on disk where the application expects it"
6666
isCorrect: true
6767
explanation: "When an application expects configuration files on disk, mount the ConfigMap as a volume. Each key becomes a file in the mount directory."
6868
- content: "Store the JSON content in a Secret and use secretKeyRef to inject it as an environment variable"
6969
isCorrect: false
70-
explanation: "This approach does not match the requirement. The application needs a file on disk, not an environment variable. Also, Secrets are for sensitive data, and this appears to be non-sensitive configuration."
70+
explanation: "This approach doesn't match the requirement. The application needs a file on disk, not an environment variable. Also, Secrets are for sensitive data, and this appears to be nonsensitive configuration."

0 commit comments

Comments
 (0)