1. What is Envoy, and how does it relate to the networking field?
a) A popular email client
b) A modern network proxy and communication bus
c) A cloud-based storage solution
d) A programming language
Answer: b
2. In which programming language is Envoy primarily implemented?
a) Java
b) C++
c) Python
d) Ruby
Answer: b
3. What is the main use case of Envoy in microservices architecture?
a) Load balancing
b) Real-time chat
c) Data analytics
d) Graphic design
Answer: a
4. Which of the following is not a key feature of Envoy?
a) Service discovery
b) Rate limiting
c) Audio streaming
d) Circuit breaking
Answer: c
5. Which project, often used in conjunction with Envoy, helps with service discovery and routing in microservices?
a) Kubernetes
b) Apache Kafka
c) Redis
d) PostgreSQL
Answer: a
6. Envoy is commonly used in what stage of the microservices request-response flow?
a) Request generation
b) Load balancing
c) Response rendering
d) Authentication
Answer: b
7. What protocol is often used for communication between Envoy and other services?
a) HTTP/1
b) SMTP
c) gRPC
d) WebSocket
Answer: c
8. Which of the following is a role typically performed by Envoy in a service mesh environment?
a) User authentication
b) Data backup
c) Traffic encryption
d) Database administration
Answer: c
9. In the context of Envoy, what does the term "cluster" refer to?
a) A group of stars
b) A collection of nodes
c) A network of microservices
d) A data structure
Answer: b
10. What does the term "sidecar proxy" refer to in the context of Envoy and microservices?
a) A type of bicycle
b) A separate proxy container running alongside a microservice
c) A remote control for a TV
d) A specialized microservice
Answer: b
11. Which of the following is not a benefit of using Envoy in microservices environments?
a) Improved observability
b) Simplified deployment
c) Enhanced security
d) Reduced latency
Answer: c
12. What is the primary purpose of the Envoy Control Plane?
a) Handling user authentication
b) Managing Envoy configuration
c) Monitoring network traffic
d) Optimizing database queries
Answer: b
13. What mechanism does Envoy use to handle circuit breaking in microservices?
a) Cutting the power to circuits
b) Automatically shutting down services
c) Managing service connections to prevent overloading
d) Encrypting data
Answer: c
14. Which of the following components is not part of a typical Envoy-based service mesh?
a) Gateway
b) Router
c) Node
d) Datacenter
Answer: b
15. How does Envoy contribute to security in microservices architecture?
a) By automatically generating strong passwords
b) By providing end-to-end encryption
c) By blocking all incoming traffic
d) By reporting security incidents
Answer: b
16. What is the role of the Envoy front proxy?
a) Handling external traffic and routing it to the appropriate microservice
b) Managing internal database connections
c) Running analytics on log data
d) Blocking all incoming traffic
Answer: a
17. Which of the following is not a commonly used protocol for communication between Envoy and other services?
a) HTTP/2
b) REST
c) TCP
d) UDP
Answer: b
18. What is the primary function of the Envoy management server?
a) Managing user accounts
b) Handling DNS queries
c) Generating SSL certificates
d) Configuring Envoy proxies
Answer: d
19. In a service mesh, what is the role of the sidecar proxy running alongside a microservice?
a) To handle user authentication
b) To route traffic to the appropriate service
c) To monitor server hardware
d) To manage database transactions
Answer: b
20. Which of the following is not a key metric that Envoy can collect and report on?
a) Request latency
b) Error rates
c) Server location
d) Request rates
Answer: c
21. What is the primary function of the Envoy discovery service?
a) Identifying UFOs
b) Discovering new microservices
c) Managing SSL certificates
d) Distributing configuration updates to Envoy proxies
Answer: d
22. How does Envoy contribute to load balancing in a microservices environment?
a) By making all services equally busy
b) By randomly selecting a service for each request
c) By intelligently distributing traffic based on health and performance
d) By blocking traffic to all services
Answer: c
23. Which of the following is not a potential issue that can be addressed using Envoy's rate limiting capabilities?
a) Preventing abuse of an API
b) Controlling traffic spikes during a promotion
c) Monitoring employee attendance
d) Protecting against DDoS attacks
Answer: c
24. In the context of Envoy, what is the role of a "bootstrap configuration"?
a) Providing information on upcoming fashion trends
b) Initializing an Envoy proxy
c) Managing database connections
d) Generating sales reports
Answer: b
25. What is the primary role of Envoy's access logging capabilities?
a) Recording user passwords
b) Monitoring service health
c) Capturing and storing detailed request and response data
d) Blocking all incoming traffic
Answer: c
26. What is the primary purpose of Envoy's retry and timeout policies?
a) Ensuring every request is processed successfully
b) Reducing the number of service instances
c) Throttling incoming traffic
d) Monitoring server performance
Answer: a
27. How does Envoy support HTTP/2 and gRPC protocols?
a) It doesn't support these protocols.
b) By automatically translating them into HTTP/1
c) By natively handling them
d) By blocking any traffic using these protocols
Answer: c
28. What does the term "hot restart" mean in the context of Envoy?
a) Reheating a cup of coffee
b) Restarting an Envoy proxy without dropping connections
c) Increasing the temperature of a server room
d) Starting a new service
Answer: b
29. What is the role of the Envoy stats sink?
a) A place to wash dirty dishes
b) A mechanism for exporting collected statistics
c) A component for encrypting data
d) A traffic jam on the network
Answer: b
30. What is the primary benefit of Envoy's automatic health checking and failure detection?
a) Reducing the number of services
b) Ensuring service reliability by removing unhealthy instances
c) Slowing down incoming traffic
d) Monitoring server logs
Answer: b
31. Which of the following is not a key concept in Envoy's routing configuration?
a) Route tables
b) Virtual hosts
c) Path matching
d) Weighted routing
Answer: a
Top comments (0)