Secure Application Development, Deployment and Automation Concep

Secure Application Development, Deployment and Automation Concep

Professional Development

10 Qs

quiz-placeholder

Similar activities

ADMSO Quiz 1

ADMSO Quiz 1

Professional Development

12 Qs

4.0 Virtualization and Cloud Computing (Exam Objectives)

4.0 Virtualization and Cloud Computing (Exam Objectives)

Professional Development

13 Qs

MS-900 Knowledge Quiz

MS-900 Knowledge Quiz

Professional Development

10 Qs

Tableau Beginner for Desktop Users Quiz 1

Tableau Beginner for Desktop Users Quiz 1

Professional Development

10 Qs

ict exam

ict exam

KG - Professional Development

10 Qs

HARDWARE Y SOFTWARE

HARDWARE Y SOFTWARE

Professional Development

10 Qs

Suse Lesson 5 CI/CD with Cloud Native Tooling

Suse Lesson 5 CI/CD with Cloud Native Tooling

Professional Development

10 Qs

Agile & Waterfall Methodology

Agile & Waterfall Methodology

Professional Development

9 Qs

Secure Application Development, Deployment and Automation Concep

Secure Application Development, Deployment and Automation Concep

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To develop secure software that prevents attackers from directly injecting attacks into computer memory and manipulating the application’s process, one should employ which method?

Elasticity

Dead code

Normalization

Software diversity

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Problems in which phase will specifically stop continuous deployment but not necessarily continuous delivery?

Continuous integration

Continuous monitoring

Continuous validation

Continuous development

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is memory management important in software development?

A program can grow and consume other program spaces

Memory is expensive.

Memory can be a speed issue.

None of the above.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When a program is installed and needs permissions, what is this called?

Staging

Provisioning

Continuous integration

Version control

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements concerning elasticity and scalability are true?

Scalability requires elasticity.

Elasticity involves enabling software to use more processors to do more work.

Elasticity means being prepared to take advantage of scalability.

All of the above.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To protect software from reverse engineering by attackers, developers can use which of the following?

Dead code

Obfuscation

Binary diversity

Stored procedures

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

To manage various releases of software over time, the organization uses which of the following?

Staging environment

Provisioning and deprovisioning steps

Version control

Continuous integration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?