Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged devops-security
Home
Tag
devops-security
0
votes
_________ simulates failure by randomly terminating clusters.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
chaos-monkey
devops-security
0
votes
Which of the following is the desirable characteristic of a useful monitoring framework?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
Which of the following security activities is carried out during the coding phase?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
What is the practice of testing the production environment continuously with different types of failure scenarios called?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
chaos-testing
devops
devops-security
0
votes
Static Application security testing can be used to uncover issues related to operational deployment.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
static-application
static-security
devops-security
0
votes
In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
devops
0
votes
Threat modeling and data flow diagrams are worked upon in the _________ phase.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
_________ testing strategy involves feeding malformed inputs to a software.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
fuzz-testing
devops-security
0
votes
_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
rugged-devops
devops
devops-security
0
votes
In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
_______ helps in validating if the server can handle degradation.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
latency-monkey
devops
devops-security
0
votes
Which of the following can be considered as a sound monitoring approach?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
sound-monitoring
devops
devops-security
0
votes
SAST requires the application to be running.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
sast
devops
devops-security
0
votes
An AppSec pipeline applies the principle of _________ into the application security program.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
How many distinct areas does the AppSec pipeline comprise?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
Which phase involves checking the signature of binaries?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
devsecops
0
votes
DevSecOps encourages creativity and experimentation.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devsecops
devops-security
0
votes
In modern software development, a large portion of code is reused from open source and third-party libraries.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
devsecops
Page:
1
2
next »
...