in Technology by
Which of the following can be used to ensure the security of the CI/CD pipeline?

1. Authentication to push changes

2. All the options

3. Secure storage of build artifacts

4. Login tracking

5. Key management

1 Answer

0 votes
by

Which of the following can be used to ensure the security of the CI/CD pipeline?

1. Authentication to push changes

2. All the options

3. Secure storage of build artifacts

4. Login tracking

5. Key management

Correct Answer is All the options

Related questions

0 votes
    How are CD and CI related to Ansible?...
asked Jan 28 in Technology by JackTerrance
0 votes
    Which of the tools is not mandated for integration in a CI pipeline ? (i)Terraform (ii)Chef (iii)Maven (iv)Selenium...
asked Oct 5, 2020 in Technology by Editorial Staff
0 votes
    What is Configuration Management in CI/CD?...
asked Jul 28, 2021 in Technology by JackTerrance
0 votes
    Does CI pipeline need to have all the software development functionalities integrated in place ? (1)False (2)True...
asked Oct 5, 2020 in Technology by Editorial Staff
0 votes
    Does CI pipeline need to have all the software development functionalities integrated in place ? (1)False (2)True...
asked Oct 5, 2020 in Technology by Editorial Staff
0 votes
    CI pipeline consists of ______________. (i)Items (ii)Stages (iii)Artifacts (iv)Commitments (v)Tickets...
asked Oct 5, 2020 in Technology by Editorial Staff
0 votes
    Which of the following can be considered as an effective solution to ensure integrity? Select the correct answer ... B)Data Hiding C)Intrusion Detection Systems D)Abstraction...
asked Dec 3, 2020 in Technology by Editorial Staff
0 votes
    Your Azure storage account is always replicated to ensure durability and high availability. By default, which of the following replications schemes is used? ZRS GRS RA-GRS LRS...
asked Aug 28, 2021 in Technology by JackTerrance
0 votes
    Each operation in a demand-driven pipeline can be implemented as an ____ that provides the following ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    Which of the following can be defined as a family of activities for enhancing security by identifying objectives and ... of the options (3)Dynamic Analysis (4)Static Analysis...
asked May 19, 2021 in Technology by JackTerrance
0 votes
    Testing before deployment is not an essential step to ensure database security. (1)False (2)True...
asked May 18, 2021 in Technology by JackTerrance
0 votes
    An AppSec pipeline applies the principle of _________ into the application security program. 1.DevOps and Agile 2.Rugged DevOps 3.DevOps 4.DevOps and Lean...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Defect density alone can be used to judge the security of code accurately. (1)False (2)True...
asked May 13, 2021 in Technology by JackTerrance
0 votes
    Which of the following can be considered as the elements of cyber security? Application Security Operational Security Network Security All of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Hash functions can be leveraged to ensure ________. (1)Availability (2)Confidentiality (3)Authentication (4)Integrity...
asked Mar 22, 2021 in Technology by JackTerrance
...