Topic 6
Which two elements help to secure your API keys? (Choose two.)
A C
Topic 6
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to
continue using a secure software development lifecycle methodology and must plan for postproduction components. Which
two areas should be the developer address? (Choose two.)
A C
Topic 6
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud?
D
Topic 6
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker
container?
D
Topic 6
Which two elements help to secure your API keys? (Choose two.)
A C
Topic 6
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without
compiling the code into a running executable?
D
Topic 6
How does eliminating hardcoded or default passwords help to secure an environment?
A
Topic 5
What is chaos engineering?
A. designing an application with fuzzy logic that makes it hard to predict
B. a product engineering approach that lacks a formal methodology
C. splitting a project between teams that do not communicate with each other
D. introducing problems into a system to study behavior and improve reliability
D
Topic 6, Security
Topic 5
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from
different devices in various formats?
D
Topic 5
Which interface is most commonly used to integrate logging, monitoring, and alerting applications into your CI/CD pipeline?
C