Skip to content

Session 1: Enterprise Deployment - Test Solutions

📝 Multiple Choice Test

Question 1: Microservices Architecture

What is the primary benefit of microservices architecture for enterprise RAG systems?
A) Reduces development time
B) Enables independent scaling and deployment of components ✅
C) Simplifies codebase
D) Reduces infrastructure costs

Explanation: Microservices architecture allows each service (ingestion, retrieval, generation) to be scaled independently based on demand. This means you can scale the computationally expensive generation service without scaling the entire system, optimizing resource utilization and costs. Independent deployment also enables rolling updates without downtime.


Question 2: JWT Authentication

Why is JWT authentication important for enterprise RAG systems?
A) It improves query performance
B) It provides stateless, secure authentication with role-based access ✅
C) It reduces memory usage
D) It enables caching

Explanation: JWT tokens are stateless, meaning they contain all necessary authentication information without requiring server-side session storage. This enables horizontal scaling and load balancing. JWTs also support role-based access control (RBAC) through claims, allowing fine-grained permissions for different resources and actions.


Question 3: Circuit Breaker Pattern

What is the purpose of circuit breaker pattern in high availability systems?
A) To reduce costs
B) To prevent cascading failures by temporarily disabling failing services ✅
C) To improve accuracy
D) To enable load balancing

Explanation: Circuit breakers monitor service health and "open" when failure rates exceed thresholds, temporarily redirecting traffic away from failing services. This prevents cascading failures where one failing service brings down dependent services, allowing time for recovery and maintaining overall system stability.


Question 4: Sensitive Data Handling

How should enterprise RAG systems handle sensitive data?
A) Store in plain text for performance
B) Encrypt at rest and in transit, with audit logging ✅
C) Use only public data
D) Store in separate databases only

Explanation: Enterprise RAG systems often process sensitive data requiring comprehensive protection. Encryption at rest protects stored data, encryption in transit protects data during transmission, and audit logging provides compliance tracking and security monitoring. This layered approach meets enterprise security and regulatory requirements.


Question 5: Enterprise Monitoring

What metrics are most important for enterprise RAG monitoring?
A) Only response time
B) Response time, error rates, throughput, and business KPIs ✅
C) Only error counts
D) Only resource utilization

Explanation: Enterprise monitoring requires multiple metric categories: response time for user experience, error rates for reliability, throughput for capacity planning, and business KPIs for value delivery. Monitoring only technical metrics misses the business impact, while monitoring only business metrics misses operational issues.


← Back to Module B