Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the PeopleCert DevOps DevSecOps Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam DevSecOps Premium Access

View all detail and faqs for the DevSecOps exam


473 Students Passed

85% Average Score

90% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following BEST describes static application security testing(SAST)?

Options:

A.

A security testing methodology that examines application vulnerabilities as it is running.

B.

Analyzes code for vulnerabilities by interacting with the application functionality.

C.

Analyzes the software composition for vulnerabilities with open-source frameworks

D.

A security testing methodology that examines code for flaws and weaknesses

Questions # 2:

When of the following BEST describes the type of data that requires both thesender and receiver to have encrypt/decrypt capacities?

Options:

A.

Data in database

B.

Data in local files

C.

Data in email message

D.

Data in memory card

Questions # 3:

When of the following BEST describes a type of firewall?

Options:

A.

Computer-based

B.

System-based

C.

User-based

D.

Cloud-based

Questions # 4:

Which of the following BEST describes an example of technical or design dew whendesigning for defensibility?

Options:

A.

Not prioritizing the set of critical customer feature in the current sprint

B.

Not including the addition of security controls in the definition of done

C.

Not developing comprehensive documentation and training material

D.

Not establishing all the product requirements prior to the first iteration

Questions # 5:

Which of the following BEST describes a responsibility of a security champion?

Options:

A.

Testing

B.

inspiration

C.

Development

D.

Monitoring

Questions # 6:

An organization is developing a web-based application using a representational state transfer (REST) web-based architecture that’s based on an HTTP protocol.

When of the following BEST describes the key elements of a REST request model?1

1. Client side software

2. Microservice design

3. Object oriented

4. Server-side API

Options:

A.

1 and 2

B.

2 and 3

C.

3 and 4

D.

1 and4

Questions # 7:

When of the following BEST describesnow developers and organizationscan use the Open web Security Project (OWASP) top tensecurity risks tor web applications?

Options:

A.

It provides strict guidance on the compliance regulations of web application design.

B.

It provides a starting place for awareness, education and development of test models

C.

It provides audit assessment tools to determine if a web application is NIST compliant.

D.

It provides a check list for designing applications using microservices architecture

Questions # 8:

DevSecOps requires many intersecting pans to collaborate and function together.

Which of the following BEST describes what an organization should focus on when starting their implementation?

Options:

A.

Process

B.

Governance

C.

Technology

D.

People

Questions # 9:

Which of the following BEST describes the goats of phishing?

1. Update web browser

2. Install risky malware

3. Steal key user data

4. Push new products

Options:

A.

1 and 2

B.

2 and 3

C.

3 and 4

D.

1 and 4

Questions # 10:

Which of following BESTdescribes the types of identity-confirming credentials in four-factor authentication?

1. Recognition

2. Ownership

3. Knowledge

4. inherence

Options:

A.

1 and 2

B.

3 and 3

C.

3 and 4

D.

1 and 4

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.