
Workshop Solution Architecture - tháng 4
Authored by Vũ Anh
English
1st Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Based on a 90-day analysis of cyberattack data reported by TheHackerNews, what is the daily average of cyberattacks?
Over 7,000
Over 17,000
Over 27,000
Over 70,000
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
DevSecOps is an acronym for:
Development, Security, and Operations
Development, Services, and Opportunities
Design, Security, and Optimization
Development, Sequencing, and Operations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following principles are foundational to DevSecOps?
Integrating security early in the development lifecycle and automating security assessments
Embedding security in the continuous integration and deployment (CI/CD) processes
Fostering a collaborative culture among the development, operations, and security teams
Committing to ongoing security monitoring and enhancement
All of the above
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which elements are integral to the DevSecOps framework? (You may choose more than 1 answer)
Code analysis
Change management
Compliance management
Threat modeling
Security training
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In the best practice for implementing DevSecOps, Which was highlighted by the speaker?
Start early
Security as code
training and awareness
Risk assessment
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What does Compliance Management encompass in DevSecOps? (You may choose more than 1 answer)
Regulatory compliance (e.g., HIPAA, GDPR, PCI DSS)
Adherence to industry standards
Enforcement of internal policies
Risk management strategies
Auditing and reporting mechanisms
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of identifying potential threats and vulnerabilities is referred to as:
Code analysis
Change management
Compliance management
Threat modeling
Security training
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?