Questions

  1. Which of the following can be security requirements for the release gate of the design stage?
    1. Threat modeling activities should be performed
    2. Review the uses of third-party components
    3. Review the top common secure design issues
    4. All of the above
  1. Which of the following is not the security gate for the coding stage?
    1. Source codes were scanned by one static code analysis tool
    2. No sensitive information was found in the source code
    3. Service logs were ready for security analysis
    4. High-severity issues in the code scanning results were all checked
  2. Does CVSS stand for Common Vulnerability Scoring System?
  3. Which of the following technologies is commonly used to do authorization for a big data framework?
    1. Apache Ranger
    2. Apache Ambari
    3. TLS ...

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.