
Chapter 5(2of3)
Authored by Khairul Imtiyaz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a software development lifecycle, different environments play crucial roles in ensuring the quality and stability of the software. However, maintaining these environments securely is essential to prevent unauthorized access and ensure smooth operations. Which of the following practices BEST addresses the security concerns associated with maintaining separate development environments?
Utilizing network segmentation to isolate development environments from each other.
Implementing role-based access control (RBAC) to restrict access based on user roles.
Implementing multi-factor authentication (MFA) for accessing development environments.
Employing encryption to secure data within development environments.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is planning to implement a sandboxing environment to keep each development environment separate and prevent unauthorized access between them. However, the development team is concerned about the impact of sandboxing on collaboration and code sharing between different development environments. Which of the following measures would be MOST EFFECTIVE in addressing these concerns while maintaining the security of the sandboxing environment?
Implementing automated code deployment tools to streamline code sharing and collaboration.
Enforcing strict access control policies based on project requirements within each sandboxed environment.
Implementing secure APIs for controlled communication between sandboxed environments.
Utilizing virtualization technology to create isolated instances for each sandboxed environment.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development team is implementing security best practices to enhance the resilience of their software. They prioritize practices such as validating third-party libraries, establishing a defined DevOps pipeline, and utilizing code signing certificates. Considering the provided information, which of the following practices involves checking third-party libraries for security vulnerabilities to ensure they do not compromise the security of the software?
Validating Third-Party Libraries
Continuous Integration
Defined DevOps Pipeline
Code Signing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Situation: A software development team is focused on establishing a robust software development lifecycle that integrates development and operations seamlessly. They aim to implement a structured process encompassing planning, coding, testing, releasing, deploying, operating, and monitoring. Considering the provided information, which of the following practices involves integrating development and operations through a structured process encompassing various stages of software development?
Defined DevOps Pipeline
Code Signing
Validating Third-Party Libraries
Threat Modeling
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Situation: A software development team is considering different approaches to enhance the security of their applications. They are exploring various security testing techniques to identify and mitigate vulnerabilities effectively. Considering the provided information, which of the following security testing techniques involves analyzing the source code of an application without executing it, aiming to identify potential vulnerabilities and security weaknesses?
SAST - Static Application Security Testing
IAST - Interactive Application Security Testing
DAST - Dynamic Application Security Testing
SCA - Software Composition Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Situation: A software development team is tasked with enhancing the security of their mobile applications. They are exploring security testing techniques specifically tailored for mobile apps to uncover vulnerabilities that could be exploited by attackers. Considering the provided information, which of the following security testing techniques focuses specifically on testing the security of mobile applications, including both native and hybrid apps?
SCA - Software Composition Analysis
MAST - Mobile Application Security Testing
RASP - Runtime Application Self-Protection
DAST - Dynamic Application Security Testing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Situation: A company is planning to integrate its enterprise applications to streamline operations and improve efficiency. They are aware of the security risks associated with each application and prioritize implementing appropriate security measures. Considering the provided information, which enterprise application requires strict access controls to safeguard sensitive data in large databases, such as customer orders and spending?
ERP (Enterprise Resource Planning)
CRM (Customer Relationship Management)
CMS (Content Management System)
CMDB (Configuration Management Database)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?