Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

PeopleCert DevSecOps Dumps

Page: 1 / 2
Total 40 questions

PeopleCert DevSecOps Exam Questions and Answers

Question 1

How can in-house security experts BEST support DevSecOps in the organization?

Options:

A.

Transform themselves into coaches and tool smiths

B.

Get involved in the SDLC before a service goes live

C.

Attend trainings to enhance practical security skills

D.

Perform regular security assessments and pen tests

Question 2

Which of the following BEST describes the meaning of DevSecOps?

Options:

A.

A security analysis of all software is performed prior to the release to ensure they are secure in operations.

B.

Security monitoring of software is performed during operations to detect security events more quickly.

C.

A security analysis of software is incorporated and automated throughout development and operations.

D.

Security events are analyzed after they occur to help understand how to prevent them in the future

Question 3

Which of the following BEST represents a key principleof a peer code review?

Options:

A.

A peer code review enables the organization to identify defects earlier in the process

B.

A peer code review allows an organization to avoid using a formal change process

C.

A peer code review enables deep worn and task speculation to improve the reliability of software

D.

A peer code review enables management to take a hands-off approach to quality assurance

Question 4

Monitoring detected that a batch fob started and completed at specific times.

Which of the following is the MOST appropriate response to this event?

Options:

A.

No action is immediately required

B.

Operations is notified to investigate

C.

An modem is togged to record me runtime

D.

A management escalation notification is triggered

Question 5

Which of following BESTdescribes the types of identity-confirming credentials in four-factor authentication?

1. Recognition

2. Ownership

3. Knowledge

4. inherence

Options:

A.

1 and 2

B.

3 and 3

C.

3 and 4

D.

1 and 4

Question 6

When of the following statements BEST describes penetration testing?

Options:

A.

A coordinated cyber attack to check simulated vulnerabilities

B.

A planned cyber attack to check for actionable vulnerabilities

C.

A coordinated cyber attack to check for planned vulnerabilities

D.

A simulated cyber attack to check for exploitable vulnerabilities

Page: 1 / 2
Total 40 questions