What happens to all associated configuration metadata (on jobs, builds, etc) after a plugin is uninstalled?
Which arc true when installing new plugins? Choose 2 answers
Which TIIKII of the following are considered best practices when setting up rules for notifications?
Which of the following are true about the "post" section of a Declarative Pipeline that defines additional steps that run at the end of either a pipeline stage or the pipeline itself? Choose 3 answers
Pipelines often require access to protected resources such as servers, databases, and SCMs. Without using an external credentials manager, which of the following provides the most secure centralized mechanism for managing the "secrets" that Jenkins requires to login/authenticate (for example: keys, tokens, passwords)?