Are Agile and DevOps the same philosophy?
A. YesB. No Way!
What enables rapid elasticity, cost reduction of operating infrastructure and flexibility?
A. Continuous Integration (CI)B. Continuous Delivery (CD)C. Cloud EnvironmentD. Continuous Releases
When was DevSecOps created?
A. 2001B. 2007C. 2008D. 2009
Which Key Performance Indicator (KPI) shows the organisation’s ability to react faster to security threats?
A. Time to valueB. Mean time to failureC. Defect DensityD. Vulnerability patching lead time
What is DevSecOps?
A. The philosophy of Developers, Operations Staff and Business Teams working togetherB. The philosophy of integrating security practices within the DevOps processC. A time-boxed, iterative approach to software deliveryD. The concept that the IT environment can become so automated that there is no need for a dedicated team to manage software in-house
What is integrating code changes into a repository and testing the new changes called?
A. Continuous DeploymentB. Continuous DeliveryC. Continuous IntegrationD. Continuous Releases
What is a SAST tool?
A. Source Code Analysis Strength Test ToolB. Source Analysis Static Test ToolC. Static Application Security Testing ToolD. Static Analysis Security Testing Tool
What enables DevOps as it focuses on small teams delivering high quality code?
A. WaterfallB. AgileC. ITILD. ISO 20000
Why should businesses adopt a DevSecOps approach?
A. To educate Development and Operations team about DevOps practicesB. To simplify Development processes for Operations staffC. To implement security practices throughout the project lifecycleD. To create a proper divide between Development and Operations teams
What is a DAST tool?
A. Detailed Architecture Security Test ToolB. Defined Analysis Security Trial ToolC. Demarcated Architecture Security Test ToolD. Dynamic Analysis Security Testing Tool
Which of the following tools can be used in the DevSecOps process?
A. CheckmarxB. Google Chrome Developer ToolsC. TrelloD. MalwareBytes
What will securing a Continuous Delivery pipeline include?
A. Protecting credentials, keys and other secretsB. Strong access control across the whole toolchain and access auditsC. Safeguarding binaries and other build artifacts against being breachedD. All of the above
Oops! You need to select an answer to continue.