Chapter 2 Integrating Software Applications into Enterprise Mark B Flashcards

1
Q

Which of the following is a container API?

A. VMware
B. Kubernetes
C. Hyper-V
D. Docker

A

B. Kubernetes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why would a company adopt secure coding standards?

A. To ensure most privilege
B. To adhere to the principle of least privilege
C. To sanitize data sent to other systems
D. To practice defense in depth
E. To deploy effective QA techniques

A

B. To adhere to the principle of least privilege
C. To sanitize data sent to other systems
D. To practice defense in depth
E. To deploy effective QA techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does Microsoft have an application vetting process for Windows Store applications?

A. To ensure products are marketable
B. To ensure applications are stable and secure
C. To make sure patches will be made available
D. To ensure HTTP is used instead of HTTPS

A

B. To ensure applications are stable and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most important for a development team validating third party libraries?

A. Third party libraries may have vulnerabilities
B. Third party libraries may be imcompatible
C. Third party libraries may not support DNSSEC
D. Third party libraries may have licensing restrictions

A

A. Third party libraries may have vulnerabilities
D. Third party libraries may have licensing restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the advantage of using the DevOps pipeline methodology?

A. Long lead times
B. Extensive pre deployment testing
C. Continuous delivery
D. Siloed operations and development environments

A

C. Continuous delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the importance of software code signing?

A. Encrypted code modules
B. Software QA
C. Software integrity
D. Software agility

A

B. Software QA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a common tool used to perform Dynamic Application Security Testing (DAST)?

A. Network enumerator
B. Sniffer
C. Fuzzer
D. WiFi Analyzer

A

C. Fuzzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of code must we have to perform Static Application Security Testing (SAST)?

A. Compiled Code
B. Dynamic Code
C. Source Code
D. Binary Code

A

C. Source Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What will my sales team use to manage sales opportunities?

A. CRM
B. ERP
C. CMDB
D. DNS

A

A. CRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would be a useful tool to integrate all business functions within an enterprise?

A. CRM
B. ERP
C. CMDB
D. DNS

A

B. ERP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be a useful tool to track all configurable assets within an enterprise?

A. CRM
B. ERP
C. CMDB
D. DNS

A

C. CMDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can I ensure content is made accessible to the appropriate users through my web based poral?

A. CRM
B. CMS
C. CMDB
D. CCMP

A

B. CMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can I protect my DNS servers from cache poisoning?

A. DMARC
B. DNSSEC
C. Strict Transport Security
D. IPSec

A

B. DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when software developers break up code into modules, each one being an independently functional unit?

A. SOA
B. ESB
C. Monolithic Architecture
D. Legacy Architecture

A

A. SOA

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most important consideration when planning for system end of life?

A. To ensure systems can be repurposed
B. To ensure there are no data remnants
C. To comply with environmental standards
D. To ensure systems do not become obsolete

A

B. To ensure there are no data remnants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of software testing is used when there has been a change within the existing environment?

A. Regression testing
B. Pentesting
C. Requirements validation
D. Release Testing

A

A. Regression testing

17
Q

What is it called when the development and operations teams work together to ensure that code released to the production environment is secure?

A. DevOps
B. Team building exercises
C. Tabletop exercises
D. SecDevOps

A

D. SecDevOps

18
Q

What software development approach would involve regular meeting with the customer and developers throughout the development process?

A Agile
B. Waterfall
C. Spiral
D. Build and Fix

A

A Agile

19
Q

What software development apporach would involve meeting with the customer and developers at the definition stage and then at the end of the development process?

A. Agile
B. Waterfall
C. Spiral
D. Build and Fix

A

B. Waterfall

20
Q

What software development approach would involve meetings with the customer aand developers at the end of a development cycle, allowing for changes to be made for the next iteration?

A. Agile
B. Waterfall
C. Spiral
D. Build and Fix

A

C. Spiral

21
Q

Where will we ensure the proper HTTP headers are configured?

A. Domain Controller
B. DNS Server
C. Web Server
D. Mail Server

A

C. Web Server