Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Node.JS Books
Special Offer
Laptop Lenovo
GATE Exam

Cat Exam
Start a Blog
Develop Your Skill

Develop Your Skill

SQL Books

Develop Your Skill

 :) Latest Topic
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
 leftlink
 :) Topic of Day
 
 :) Hot Jobs
 :)
 :) Most Searchable
 


 :) Quiz System
Computer Quiz
Science Quiz
Banking Quiz
Sports Quiz
GK Quiz


  

 
Which of the following can be considered as a sound monitoring approach? View:-26214
Question Posted on 22 Dec 2021

Which of the following can be considered as a sound monitoring approach?
Choose correct option from below....
ADS Posted In : Devops | Devops Security



Which of the following SAST tools analyze to uncover vulnerabilities? View:-25504
Question Posted on 22 Dec 2021

Which of the following SAST tools analyze to uncover vulnerabilities?
Choose correct option from below li....
ADS Posted In : Devops | Devops Security


_________ testing strategy involves feeding malformed inputs to a software. View:-34741
Question Posted on 17 Feb 2021

_________ testing strategy involves feeding malformed inputs to a software.
Choose the correct option fro....
ADS Posted In : Devops | Devops Security


Which of the following is the desirable characteristic of a useful monitoring framework? View:-30853
Question Posted on 16 Feb 2021

Which of the following is the desirable characteristic of a useful monitoring framework?
Choose the corre....
ADS Posted In : Devops | Devops Security


_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks. View:-31015
Question Posted on 15 Feb 2021

_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.
Choose....
ADS Posted In : Devops | Devops Security


_________ simulates failure by randomly terminating clusters. View:-36477
Question Posted on 08 Feb 2021

_________ simulates failure by randomly terminating clusters.
Choose the correct option from below list <....
ADS Posted In : Devops | Devops Security


________ procedure involves integrating secure development practices and methodologies into development and deployment processes that enforce DevOps. View:-31409
Question Posted on 01 Feb 2021

________ procedure involves integrating secure development practices and methodologies into development and d....
ADS Posted In : Devops | Devops Security


DevSecOps encourages creativity and experimentation. View:-41662
Question Posted on 29 Jan 2021

DevSecOps encourages creativity and experimentation.
Choose the correct option from below list
(1)Fal....
ADS Posted In : Devops | Devops Security


Which is the software development approach that first emphasized on incorporating customer feedback early and often? View:-25981
Question Posted on 28 Jan 2021

Which is the software development approach that first emphasized on incorporating customer feedback early and....
ADS Posted In : Devops | Devops Security


Threat modeling and data flow diagrams are worked upon in the _________ phase. View:-42003
Question Posted on 02 Feb 2021

Threat modeling and data flow diagrams are worked upon in the _________ phase.
Choose the correct option ....
ADS Posted In : Devops | Devops Security


In DevSecOps, security-related activities are the sole responsibility of the security team. View:-33322
Question Posted on 30 Jan 2021

In DevSecOps, security-related activities are the sole responsibility of the security team.
Choose the co....
ADS Posted In : Devops | Devops Security


____________ adds robust security practices and strategies to traditional DevOps practices. View:-31715
Question Posted on 27 Jan 2021

____________ adds robust security practices and strategies to traditional DevOps practices.
Choose the co....
ADS Posted In : Devops | Devops Security


In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. View:-31214
Question Posted on 21 Jan 2021

In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either....
ADS Posted In : Devops | Devops Security


Which of the following can be used to ensure the security of the CI/CD pipeline? View:-32420
Question Posted on 18 Jan 2021

Which of the following can be used to ensure the security of the CI/CD pipeline?
Choose the correct optio....
ADS Posted In : Devops | Devops Security


_________ approach aims to include security in each phase of the development cycle. View:-41787
Question Posted on 18 Jan 2021

_________ approach aims to include security in each phase of the development cycle.
Choose the correct op....
ADS Posted In : Devops | Devops Security


____________ software development methodology characterizes security as a primary consideration throughout the processes of development and delivery o View:-36809
Question Posted on 18 Jan 2021

____________ software development methodology characterizes security as a primary consideration throughout th....
ADS Posted In : Devops | Devops Security


An AppSec pipeline applies the principle of _________ into the application security program. View:-38839
Question Posted on 18 Jan 2021

An AppSec pipeline applies the principle of _________ into the application security program.
Choose the c....
ADS Posted In : Devops | Devops Security


Which phase involves checking the signature of binaries? View:-37960
Question Posted on 19 Jan 2021

Which phase involves checking the signature of binaries?
Choose the correct option from below list
(1....
ADS Posted In : Devops | Devops Security


In modern software development, a large portion of code is reused from open source and third-party libraries. View:-42083
Question Posted on 18 Jan 2021

In modern software development, a large portion of code is reused from open source and third-party libraries.....
ADS Posted In : Devops | Devops Security


What is the practice of testing the production environment continuously with different types of failure scenarios called? View:-31139
Question Posted on 04 Feb 2021

What is the practice of testing the production environment continuously with different types of failure scena....
ADS Posted In : Devops | Devops Security


In the DevSecOps, during which phase of the development cycle are the security aspects considered? View:-31676
Question Posted on 17 Jan 2021

In the DevSecOps, during which phase of the development cycle are the security aspects considered?
Choose....
ADS Posted In : Devops | Devops Security


Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes? View:-25811
Question Posted on 05 Feb 2021

Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment process....
ADS Posted In : Devops | Devops Security


In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities? View:-37700
Question Posted on 22 Jan 2021

In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?
Choose the c....
ADS Posted In : Devops | Devops Security


SAST is also known as ____________. View:-34145
Question Posted on 22 Jan 2021

SAST is also known as ____________.
Choose the correct option from below list
(1)Black box testing
ADS Posted In : Devops | Devops Security


RASP works as a network device. View:-34428
Question Posted on 13 Feb 2021

RASP works as a network device.
Choose the correct option from below list
(1)True
(2)False
<....
ADS Posted In : Devops | Devops Security


In the AppSec pipeline, the first phase, intake process, is also known as ___________. View:-60245
Question Posted on 11 Feb 2021

In the AppSec pipeline, the first phase, intake process, is also known as ___________.
Choose the correct....
ADS Posted In : Devops | Devops Security


DAST is independent of programming languages. View:-36504
Question Posted on 09 Feb 2021

DAST is independent of programming languages.
Choose the correct option from below list
(1)False
....
ADS Posted In : Devops | Devops Security


How many distinct areas does the AppSec pipeline comprise? View:-33876
Question Posted on 07 Feb 2021

How many distinct areas does the AppSec pipeline comprise?
Choose the correct option from below list
....
ADS Posted In : Devops | Devops Security


____________ software development approach aims to enhance the collaboration between the software development and the IT operations team. View:-28988
Question Posted on 27 Jan 2021

____________ software development approach aims to enhance the collaboration between the software development....
ADS Posted In : Devops | Devops Security


_______ helps in meditating multi-availability zone residency regularly. View:-39722
Question Posted on 20 Jan 2021

_______ helps in meditating multi-availability zone residency regularly.
Choose the correct option from b....
ADS Posted In : Devops | Devops Security


In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through softwa View:-32696
Question Posted on 22 Jan 2021

In ________ type of IT setup, developers or operations teams automatically manage and provision the technolog....
ADS Posted In : Devops | Devops Security


1 2
 
  
 :) Categoriese
 :) Most Visited Questions