Pass the PeopleCert DevOps DevSecOps Questions and answers with CertsForce

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following BEST describes a public key cryptography architect?

Options:

A.

A person sends a message that is encrypted by using their private key, and the receiver must also use that private key to decipher the message.


B.

Messages are encrypted into cipher text and then are deciphered upon receipt by using a pair of public keys.


C.

Messages are encrypted into cipher text and then are deciphered upon receipt by using a pair of secure private keys.


D.

A person sends a message that is encrypted by the use of a public key, and the receiver can decipher the message using their private key.


Questions # 2:

When of the following BEST describes a type of firewall?

Options:

A.

Computer-based


B.

System-based


C.

User-based


D.

Cloud-based


Questions # 3:

Which of the following is BEST deserved as "being outside the scope of risk management inDevSecOps"?

Options:

A.

Manage major events that caused harm or loss


B.

inform business risk decisions for applications


C.

Assess me effectiveness of cybersecurity program


D.

Ensure the acuity to meet compliance controls


Questions # 4:

Which of the following BEST describes continuous deployment?

Options:

A.

A software release process that uses automated testing and autonomous deployment


B.

A coding approach where branches are merged to a master branch multiple times a day


C.

A rapid incident response plan for increased visibility and mitigation of failure


D.

A set of practices to ensure code can be deployed rapidly and safely to production


Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions