Chapter 2 Integrating Software Applications into Enterprise Mark B Flashcards
Which of the following is a container API?
A. VMware
B. Kubernetes
C. Hyper-V
D. Docker
B. Kubernetes
Why would a company adopt secure coding standards?
A. To ensure most privilege
B. To adhere to the principle of least privilege
C. To sanitize data sent to other systems
D. To practice defense in depth
E. To deploy effective QA techniques
B. To adhere to the principle of least privilege
C. To sanitize data sent to other systems
D. To practice defense in depth
E. To deploy effective QA techniques
Why does Microsoft have an application vetting process for Windows Store applications?
A. To ensure products are marketable
B. To ensure applications are stable and secure
C. To make sure patches will be made available
D. To ensure HTTP is used instead of HTTPS
B. To ensure applications are stable and secure
What is the most important for a development team validating third party libraries?
A. Third party libraries may have vulnerabilities
B. Third party libraries may be imcompatible
C. Third party libraries may not support DNSSEC
D. Third party libraries may have licensing restrictions
A. Third party libraries may have vulnerabilities
D. Third party libraries may have licensing restrictions
What is the advantage of using the DevOps pipeline methodology?
A. Long lead times
B. Extensive pre deployment testing
C. Continuous delivery
D. Siloed operations and development environments
C. Continuous delivery
What is the importance of software code signing?
A. Encrypted code modules
B. Software QA
C. Software integrity
D. Software agility
B. Software QA
Which of the following is a common tool used to perform Dynamic Application Security Testing (DAST)?
A. Network enumerator
B. Sniffer
C. Fuzzer
D. WiFi Analyzer
C. Fuzzer
What type of code must we have to perform Static Application Security Testing (SAST)?
A. Compiled Code
B. Dynamic Code
C. Source Code
D. Binary Code
C. Source Code
What will my sales team use to manage sales opportunities?
A. CRM
B. ERP
C. CMDB
D. DNS
A. CRM
What would be a useful tool to integrate all business functions within an enterprise?
A. CRM
B. ERP
C. CMDB
D. DNS
B. ERP
What would be a useful tool to track all configurable assets within an enterprise?
A. CRM
B. ERP
C. CMDB
D. DNS
C. CMDB
How can I ensure content is made accessible to the appropriate users through my web based poral?
A. CRM
B. CMS
C. CMDB
D. CCMP
B. CMS
How can I protect my DNS servers from cache poisoning?
A. DMARC
B. DNSSEC
C. Strict Transport Security
D. IPSec
B. DNSSEC
What is it called when software developers break up code into modules, each one being an independently functional unit?
A. SOA
B. ESB
C. Monolithic Architecture
D. Legacy Architecture
A. SOA
Explanation:
What is the most important consideration when planning for system end of life?
A. To ensure systems can be repurposed
B. To ensure there are no data remnants
C. To comply with environmental standards
D. To ensure systems do not become obsolete
B. To ensure there are no data remnants