Secure Application Development, Deployment and Automation Concep

Secure Application Development, Deployment and Automation Concep

Professional Development

10 Qs

quiz-placeholder

Similar activities

Securing Source Code

Securing Source Code

Professional Development

10 Qs

Suse Lesson 5 CI/CD with Cloud Native Tooling

Suse Lesson 5 CI/CD with Cloud Native Tooling

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - MS Azure vs Windows Server

IT ENGLISH: Research Project Topics - MS Azure vs Windows Server

Professional Development

10 Qs

Software Basic Design

Software Basic Design

Professional Development

10 Qs

Quiz - Lintasarta Cloudeka Webinar

Quiz - Lintasarta Cloudeka Webinar

University - Professional Development

10 Qs

Servers

Servers

Professional Development

10 Qs

Review Class 9

Review Class 9

Professional Development

9 Qs

Cloud Computing Model Exam-IV PART-B

Cloud Computing Model Exam-IV PART-B

Professional Development

15 Qs

Secure Application Development, Deployment and Automation Concep

Secure Application Development, Deployment and Automation Concep

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To develop secure software that prevents attackers from directly injecting attacks into computer memory and manipulating the application’s process, one should employ which method?

Elasticity

Dead code

Normalization

Software diversity

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Problems in which phase will specifically stop continuous deployment but not necessarily continuous delivery?

Continuous integration

Continuous monitoring

Continuous validation

Continuous development

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is memory management important in software development?

A program can grow and consume other program spaces

Memory is expensive.

Memory can be a speed issue.

None of the above.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When a program is installed and needs permissions, what is this called?

Staging

Provisioning

Continuous integration

Version control

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements concerning elasticity and scalability are true?

Scalability requires elasticity.

Elasticity involves enabling software to use more processors to do more work.

Elasticity means being prepared to take advantage of scalability.

All of the above.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To protect software from reverse engineering by attackers, developers can use which of the following?

Dead code

Obfuscation

Binary diversity

Stored procedures

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To manage various releases of software over time, the organization uses which of the following?

Staging environment

Provisioning and deprovisioning steps

Version control

Continuous integration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?