Search Header Logo

Chapter 5(2of3)

Authored by Khairul Imtiyaz

Computers

University

Used 1+ times

Chapter 5(2of3)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a software development lifecycle, different environments play crucial roles in ensuring the quality and stability of the software. However, maintaining these environments securely is essential to prevent unauthorized access and ensure smooth operations. Which of the following practices BEST addresses the security concerns associated with maintaining separate development environments?

Utilizing network segmentation to isolate development environments from each other.

Implementing role-based access control (RBAC) to restrict access based on user roles.

Implementing multi-factor authentication (MFA) for accessing development environments.

Employing encryption to secure data within development environments.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is planning to implement a sandboxing environment to keep each development environment separate and prevent unauthorized access between them. However, the development team is concerned about the impact of sandboxing on collaboration and code sharing between different development environments. Which of the following measures would be MOST EFFECTIVE in addressing these concerns while maintaining the security of the sandboxing environment?

Implementing automated code deployment tools to streamline code sharing and collaboration.

Enforcing strict access control policies based on project requirements within each sandboxed environment.

Implementing secure APIs for controlled communication between sandboxed environments.

Utilizing virtualization technology to create isolated instances for each sandboxed environment.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software development team is implementing security best practices to enhance the resilience of their software. They prioritize practices such as validating third-party libraries, establishing a defined DevOps pipeline, and utilizing code signing certificates. Considering the provided information, which of the following practices involves checking third-party libraries for security vulnerabilities to ensure they do not compromise the security of the software?

Validating Third-Party Libraries

Continuous Integration

Defined DevOps Pipeline

Code Signing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Situation: A software development team is focused on establishing a robust software development lifecycle that integrates development and operations seamlessly. They aim to implement a structured process encompassing planning, coding, testing, releasing, deploying, operating, and monitoring. Considering the provided information, which of the following practices involves integrating development and operations through a structured process encompassing various stages of software development?

Defined DevOps Pipeline

Code Signing

Validating Third-Party Libraries

Threat Modeling

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Situation: A software development team is considering different approaches to enhance the security of their applications. They are exploring various security testing techniques to identify and mitigate vulnerabilities effectively. Considering the provided information, which of the following security testing techniques involves analyzing the source code of an application without executing it, aiming to identify potential vulnerabilities and security weaknesses?

SAST - Static Application Security Testing

IAST - Interactive Application Security Testing

DAST - Dynamic Application Security Testing

SCA - Software Composition Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Situation: A software development team is tasked with enhancing the security of their mobile applications. They are exploring security testing techniques specifically tailored for mobile apps to uncover vulnerabilities that could be exploited by attackers. Considering the provided information, which of the following security testing techniques focuses specifically on testing the security of mobile applications, including both native and hybrid apps?

SCA - Software Composition Analysis

MAST - Mobile Application Security Testing

RASP - Runtime Application Self-Protection

DAST - Dynamic Application Security Testing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Situation: A company is planning to integrate its enterprise applications to streamline operations and improve efficiency. They are aware of the security risks associated with each application and prioritize implementing appropriate security measures. Considering the provided information, which enterprise application requires strict access controls to safeguard sensitive data in large databases, such as customer orders and spending?

ERP (Enterprise Resource Planning)

CRM (Customer Relationship Management)

CMS (Content Management System)

CMDB (Configuration Management Database)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?