Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

PeopleCert DevSecOps - PeopleCert DevSecOps Exam

Page: 1 / 2
Total 40 questions

When of the following BEST describes a benefit of immutable objects?

A.

Deployments are more predictable

B.

Feature changes are less risky

C.

Releases are completed faster

D.

Changes are more successful

Which of the followingBEST describes how containers and image layers are related?

A.

Layers of a container are dependent on the layer immediately above it

B.

A layer within a container is designed withinmicroservicesarchitecture

C.

Layers are immutable files that represent a snapshot of a container.

D.

A layer consists of multiple containers withsimilarmicroservices architecture

Which of the following is NOT a security requirement unique to mobile applications?

A.

Source code must be checked for programmatic and stylistic errors

B.

Secrets information must be stored for secure back-end service calls

C.

They must be designed to run safely outside of the secure network

D.

Data must be kept secure to prevent leaking to other applications

Which of the following BEST describes the meaning of DevSecOps?

A.

A security analysis of all software is performed prior to the release to ensure they are secure in operations.

B.

Security monitoring of software is performed during operations to detect security events more quickly.

C.

A security analysis of software is incorporated and automated throughout development and operations.

D.

Security events are analyzed after they occur to help understand how to prevent them in the future

Which of the following BEST fills inthe bank?

"In DevSecOps environments information security is__________as much as possible into the daily work of development and operations".

A.

Designed

B.

Embedded

C.

integrated

D.

Automated

Which of the following BEST describes the goats of phishing?

1. Update web browser

2. Install risky malware

3. Steal key user data

4. Push new products

A.

1 and 2

B.

2 and 3

C.

3 and 4

D.

1 and 4

Which of the following BEST represents a key principleof a peer code review?

A.

A peer code review enables the organization to identify defects earlier in the process

B.

A peer code review allows an organization to avoid using a formal change process

C.

A peer code review enables deep worn and task speculation to improve the reliability of software

D.

A peer code review enables management to take a hands-off approach to quality assurance

DevSecOps requires many intersecting pans to collaborate and function together.

Which of the following BEST describes what an organization should focus on when starting their implementation?

A.

Process

B.

Governance

C.

Technology

D.

People

Which of the following BEST describes static application security testing(SAST)?

A.

A security testing methodology that examines application vulnerabilities as it is running.

B.

Analyzes code for vulnerabilities by interacting with the application functionality.

C.

Analyzes the software composition for vulnerabilities with open-source frameworks

D.

A security testing methodology that examines code for flaws and weaknesses

In shift-left thinking software Dogs and errors should IDEALLY be detected during which phase of testing?

A.

During UAT tests

B.

During staging tests

C.

During unit tests

D.

During system tests