Blogmepost
Latest Questions
Contact Us
Which of the following security activities is carried out during the coding phase?
Home
>
Technology
>
Which of the following security activities is carried out during the coding phase?
0
votes
1.7k
views
Which of the following security activities is carried out during the coding phase?
1. Security Architecture review
2. All the options
3. Environment hardening
4. Core Inspections
#devsecops
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
recategorized
Oct 28, 2020
by
JackTerrance
Add Answer
1
Answer
0
votes
Which of the following security activities is carried out during the coding phase?
1. Security Architecture review
2. All the options
3. Environment hardening
4. Core Inspections
Correct Answer is All the options
answered
Oct 28, 2020
by
JackTerrance
(
193k
points)
Related questions
0
votes
1
answer
970
views
970
views
In the DevSecOps, during which phase of the development cycle are the security aspects considered?
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devopssec
0
votes
2
answers
1.1k
views
1.1k
views
Which phase of DevSecOps emphasizes reliability, performance, and scaling?
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
891
views
891
views
Which of the following is an advantage of DevSecOps?
asked
Oct 28, 2020
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
2.1k
views
2.1k
views
In the AppSec pipeline, the first phase, intake process, is also known as ___________.
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
250
views
250
views
Dynamic Application Security testing is also known as __________.
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
65
views
65
views
What is shift-left security in DevSecOps?
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
123
views
123
views
Which of the following is the correct order of servlet life cycle phase methods?
asked
Jan 12
in
Technology
by
JackTerrance
(
193k
points)
servlets
0
votes
1
answer
491
views
491
views
____________ adds robust security practices and strategies to traditional DevOps practices.
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
17
views
17
views
Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?
asked
2 days
ago
in
Technology
by
JackTerrance
(
193k
points)
cyber-security-questions-answers
0
votes
1
answer
19
views
19
views
In Wi-Fi Security, which of the following protocol is more used?
asked
2 days
ago
in
Technology
by
JackTerrance
(
193k
points)
cyber-security-questions-answers
0
votes
1
answer
1.1k
views
1.1k
views
In modern software development, a large portion of code is reused from open source and third-party libraries.
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
994
views
994
views
In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through software.
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
1
answer
804
views
804
views
In DevSecOps, security-related activities are the sole responsibility of the security team.
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devops
0
votes
1
answer
1.5k
views
1.5k
views
_________ approach aims to include security in each phase of the development cycle.
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devops
0
votes
1
answer
1.6k
views
1.6k
views
_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.
asked
Oct 25, 2020
by
JackTerrance
(
193k
points)
#endpoint
0
votes
1
answer
13
views
13
views
Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?
asked
2 days
ago
in
Technology
by
JackTerrance
(
193k
points)
cyber-security-questions-answers
0
votes
1
answer
22
views
22
views
Which of the following can be considered as the elements of cyber security?
asked
2 days
ago
in
Technology
by
JackTerrance
(
193k
points)
cyber-security-questions-answers
0
votes
1
answer
2.5k
views
2.5k
views
Which of the following can be used to ensure the security of the CI/CD pipeline?
asked
Oct 28, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devops
0
votes
1
answer
722
views
722
views
Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
193k
points)
#endpoint
0
votes
1
answer
543
views
543
views
Which of the following are features of Endpoint Security solutions?
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
193k
points)
#endpoint
0
votes
1
answer
13
views
13
views
Operation Carried Out In Thermal Power Stations?
asked
Dec 12, 2020
in
Technology
by
JackTerrance
(
193k
points)
electrical
0
votes
1
answer
43
views
43
views
What are advantage of DevSecOps?
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
+1
vote
1
answer
12
views
12
views
What is the problem with the following coding snippet?
asked
Nov 9, 2020
in
Technology
by
JackTerrance
(
193k
points)
#c-programming
0
votes
1
answer
20
views
20
views
Who Is Responsible for DevSecOps?
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
0
votes
2
answers
898
views
898
views
____________ software development approach aims to enhance the collaboration between the software development and the IT operations team.
asked
Oct 27, 2020
in
Technology
by
JackTerrance
(
193k
points)
#devsecops
...