Login
Remember
Register
Ask a Question
Recent questions tagged devops-security
0
votes
1
answer
_________ simulates failure by randomly terminating clusters.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
chaos-monkey
devops-security
0
votes
1
answer
Which of the following is the desirable characteristic of a useful monitoring framework?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
Which of the following security activities is carried out during the coding phase?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
What is the practice of testing the production environment continuously with different types of failure scenarios called?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
chaos-testing
devops
devops-security
0
votes
1
answer
Static Application security testing can be used to uncover issues related to operational deployment.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
static-application
static-security
devops-security
0
votes
1
answer
In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
devops
0
votes
1
answer
Threat modeling and data flow diagrams are worked upon in the _________ phase.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
_________ testing strategy involves feeding malformed inputs to a software.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
fuzz-testing
devops-security
0
votes
1
answer
_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
rugged-devops
devops
devops-security
0
votes
1
answer
In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
_______ helps in validating if the server can handle degradation.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
latency-monkey
devops
devops-security
0
votes
1
answer
Which of the following can be considered as a sound monitoring approach?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
sound-monitoring
devops
devops-security
0
votes
1
answer
SAST requires the application to be running.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
sast
devops
devops-security
0
votes
1
answer
An AppSec pipeline applies the principle of _________ into the application security program.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
How many distinct areas does the AppSec pipeline comprise?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
0
votes
1
answer
Which phase involves checking the signature of binaries?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops
devops-security
devsecops
0
votes
1
answer
DevSecOps encourages creativity and experimentation.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devsecops
devops-security
0
votes
1
answer
In modern software development, a large portion of code is reused from open source and third-party libraries.
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
devsecops
Page:
1
2
next »
...