- Which of the following can be security requirements for the release gate of the design stage?
- Threat modeling activities should be performed
- Review the uses of third-party components
- Review the top common secure design issues
- All of the above
- Which of the following is not the security gate for the coding stage?
- Source codes were scanned by one static code analysis tool
- No sensitive information was found in the source code
- Service logs were ready for security analysis
- High-severity issues in the code scanning results were all checked
- Does CVSS stand for Common Vulnerability Scoring System?
- Which of the following technologies is commonly used to do authorization for a big data framework?
- Apache Ranger
- Apache Ambari
- TLS ...