Questions

  1. What security practices are related to secure coding?
    1. Security scanning using IDE plugins
    2. Security unit testing
    3. Static code scanning
    4. All of the above
  1. What does the tool DevSkim do?
    1. Reverse engineering
    2. It is an IDE plugin for static code scanning
    3. Web security scanning
    4. Network security
  1. What techniques are used to defend against memory overflow attacks?
    1. Stack randomization
    2. Nonexecution
    3. Exception handler protection
    4. All of the above
  2. What's the main purpose of using dependency check tools?
    1. Software integrity
    2. Implements access control
    3. Scans for known vulnerabilities
    4. Data encryption
  3. What security testing can Radamsa be used for?
    1. API fuzz testing
    2. Integrity monitoring
    3. Dynamic analysis
    4. Mobile application

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.