Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

DAST is independent of programming languages.

Answer» DAST is independent of PROGRAMMING languages.
Choose the correct option from below LIST
(1)False
(2)TRUE

Answer:-(2)True
2.

____________ software development methodology characterizes security as a primary consideration throughout the processes of development and delivery o

Answer»

____________ software development methodology CHARACTERIZES security as a primary consideration THROUGHOUT the processes of development and DELIVERY of software.
Choose the correct option from below list
(1)Continuous Security
(2)DevSecOps
(3)Rugged DEVOPS
(4)Secure Agile

Answer:-(3)Rugged DevOps

3.

_________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.

Answer»

_________ emphasizes INCREASED trust, transparency, and a clearer UNDERSTANDING of probable risks.
Choose the correct option from below list
(1)DevSecOps
(2)Rugged DEVOPS

Answer:-(2)Rugged DevOps

4.

_________ simulates failure by randomly terminating clusters.

Answer»

_________ simulates failure by randomly terminating clusters.
Choose the correct option from below list
(1)LATENCY Monkey
(2)Chaos KONG
(3)Chaos Monkey
(4)Chaos Gorilla

Answer:-(3)Chaos Monkey

5.

________ procedure involves integrating secure development practices and methodologies into development and deployment processes that enforce DevOps.

Answer»

________ procedure INVOLVES integrating secure development practices and methodologies into development and deployment PROCESSES that ENFORCE DevOps.
Choose the correct option from below list
(1)SOFTWARE development SECURITY
(2)Application Security
(3)DevSecOps
(4)Security Testing

Answer:-(3)DevSecOps

6.

_________ approach aims to include security in each phase of the development cycle.

Answer»

_________ APPROACH aims to include SECURITY in each phase of the development cycle.
Choose the CORRECT OPTION from below list
(1)Shift RIGHT Security
(2)Shift Left security
(3)Consistent Security
(4)Continuous Security

Answer:-(2)Shift Left security

7.

DevSecOps encourages creativity and experimentation.

Answer»

DevSecOps ENCOURAGES creativity and experimentation.
Choose the correct OPTION from below list
(1)False
(2)True

Answer:-(2)True

8.

Which is the software development approach that first emphasized on incorporating customer feedback early and often?

Answer»

Which is the software development APPROACH that first emphasized on INCORPORATING customer feedback early and often?
Choose the correct option from below list
(1)Agile
(2)Waterfall
(3)DevOps
(4)Lean

Answer:-(1)Agile

9.

Threat modeling and data flow diagrams are worked upon in the _________ phase.

Answer» THREAT modeling and data flow diagrams are worked upon in the _________ phase.
Choose the correct OPTION from below list
(1)Planning
(2)OPERATING
(3)Coding
(4)Testing

Answer:-(1)Planning
10.

In DevSecOps, security-related activities are the sole responsibility of the security team.

Answer»

In DevSecOps, SECURITY-related activities are the sole responsibility of the security team.
Choose the CORRECT OPTION from below list
(1)True
(2)False

Answer:-(2)False

11.

____________ adds robust security practices and strategies to traditional DevOps practices.

Answer»

____________ ADDS ROBUST security practices and strategies to traditional DEVOPS practices.
Choose the CORRECT option from below list
(1)RUGGED DevOps
(2)DevSecOps

Answer:-(2)DevSecOps

12.

In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test.

Answer»

In _________ approach, the code is ANALYZED for security VULNERABILITIES, while the application is run either manually or by an automated test.
Choose the correct option from below list
(1)DAST
(2)IAST
(3)RASP
(4)SAST

Answer:-(2)IAST

13.

Which of the following can be used to ensure the security of the CI/CD pipeline?

Answer»

Which of the following can be USED to ensure the security of the CI/CD pipeline?
Choose the correct option from below list
(1)All the OPTIONS
(2)Key management
(3)Authentication to push changes
(4)Secure storage of build ARTIFACTS
(5)Login tracking

Answer:-(1)All the options

14.

Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes?

Answer»

Which of the following is used by IaC to code more VERSATILE and adaptive provisioning and deployment processes?
Choose the correct option from below LIST
(1)Descriptive LANGUAGE
(2)Programming SCRIPTS
(3)High-level or descriptive language
(4)High-level languages

Answer:-(3)High-level or descriptive language

15.

An AppSec pipeline applies the principle of _________ into the application security program.

Answer»

An AppSec pipeline applies the principle of _________ into the application security program.
Choose the correct OPTION from below list
(1)DevOps
(2)DevOps and AGILE
(3)Rugged DevOps
(4)DevOps and LEAN

Answer:-(4)DevOps and Lean

16.

Which phase involves checking the signature of binaries?

Answer»

Which phase INVOLVES CHECKING the signature of binaries?
Choose the correct option from below LIST
(1)Release
(2)Operate
(3)Deploy
(4)Monitor

Answer:-(2)Operate

17.

In modern software development, a large portion of code is reused from open source and third-party libraries.

Answer»

In MODERN software DEVELOPMENT, a LARGE portion of code is reused from open source and third-party libraries.
Choose the correct option from below list
(1)True
(2)False

Answer:-(1)True

18.

What is the practice of testing the production environment continuously with different types of failure scenarios called?

Answer»

What is the practice of testing the production environment continuously with different TYPES of failure SCENARIOS called?
Choose the correct option from below list
(1)RASP
(2)Fuzz Testing
(3)IAST
(4)CHAOS Testing

Answer:-(4)Chaos Testing

19.

In the DevSecOps, during which phase of the development cycle are the security aspects considered?

Answer»

In the DevSecOps, during which phase of the development cycle are the SECURITY aspects considered?
Choose the correct option from below list
(1)At the end of the RELEASE cycle
(2)Throughout the application lifecycle
(3)During the testing phase
(4)During the development process

Answer:-(2)Throughout the application lifecycle

20.

SAST is also known as ____________.

Answer»

SAST is also known as ____________.
CHOOSE the correct OPTION from below list
(1)Black box testing
(2)Grey box testing
(3)White box testing

Answer:-(3)White box testing

21.

RASP works as a network device.

Answer» RASP works as a NETWORK device.
Choose the CORRECT option from below list
(1)True
(2)False

Answer:-(2)False
22.

In the AppSec pipeline, the first phase, intake process, is also known as ___________.

Answer»

In the AppSec pipeline, the first PHASE, intake process, is ALSO known as ___________.
Choose the CORRECT option from below list
(1)Request phase
(2)First IMPRESSION
(3)In tunnel
(4)In point

Answer:-(2)First impression

23.

In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through softwa

Answer»

In ________ type of IT setup, developers or OPERATIONS teams automatically manage and provision the technology stack for an application through software.
Choose the correct option from below list
(1)Programming scripts
(2)Infrastructure AUTOMATION
(3)Infrastructure as a Service
(4)Infrastructure as Code

Answer:-(4)Infrastructure as Code

24.

How many distinct areas does the AppSec pipeline comprise?

Answer»

How many DISTINCT areas does the AppSec pipeline COMPRISE?
Choose the correct OPTION from below list
(1)DEPENDS on the application
(2)TWO
(3)Four
(4)Three

Answer:-(3)Four

25.

____________ software development approach aims to enhance the collaboration between the software development and the IT operations team.

Answer»

____________ software development approach aims to ENHANCE the COLLABORATION between the software development and the IT operations team.
Choose the correct OPTION from below list
(1)Lean
(2)AGILE
(3)DevOps
(4)Waterfall

Answer:-(3)DevOps

26.

_______ helps in meditating multi-availability zone residency regularly.

Answer»

_______ helps in meditating multi-availability zone RESIDENCY regularly.
Choose the correct option from below LIST
(1)Latency MONKEY
(2)Conformity Monkey
(3)CHAOS Gorilla
(4)Chaos Monkey

Answer:-(3)Chaos Gorilla

27.

_______ helps in validating if the server can handle degradation.

Answer»

_______ HELPS in validating if the server can handle degradation.
Choose correct option from below list
(1)Latency Monkey
(2)Chaos GORILLA
(3)Chaos Monkey
(4)Chaos Kong

Answer:-(1)Latency Monkey

28.

Which of the following can be considered as a sound monitoring approach?

Answer»

Which of the following can be CONSIDERED as a sound monitoring approach?
Choose correct option from below list
(1)SIM
(2)SIEM
(3)SEM

Answer:-(2)SIEM

29.

Which of the following SAST tools analyze to uncover vulnerabilities?

Answer»

Which of the FOLLOWING SAST tools analyze to uncover vulnerabilities?
Choose correct OPTION from below LIST
(1)Configuration FILES
(2)All the options
(3)Source CODE
(4)Binaries

Answer:-(2)All the options

30.

_________ testing strategy involves feeding malformed inputs to a software.

Answer»

_________ testing strategy involves FEEDING MALFORMED inputs to a software.
Choose the correct option from below list
(1)Fuzz Testing
(2)CHAOS Testing
(3)Disruption Testing

Answer:-(1)Fuzz Testing

31.

Which of the following is the desirable characteristic of a useful monitoring framework?

Answer»

Which of the following is the desirable characteristic of a useful monitoring framework?
Choose the CORRECT OPTION from below list
(1)CORRELATION
(2)Retention
(3)Data AGGREGATION
(4)All the options
(5)Alerting

Answer:-(4)All the options

32.

Which of the following security activities is carried out during the coding phase?

Answer»

Which of the following security activities is carried out during the CODING phase?
Choose the CORRECT option from below list
(1)CORE Inspections
(2)ENVIRONMENT hardening
(3)Security Architecture review
(4)All the options

Answer:-(4)All the options

33.

Which phase of DevSecOps emphasizes reliability, performance, and scaling?

Answer»

Which PHASE of DEVSECOPS emphasizes reliability, performance, and scaling?
Choose the correct OPTION from below list
(1)Development
(2)Security
(3)Operations

Answer:-(2)Security

34.

Static Application security testing can be used to uncover issues related to operational deployment.

Answer» STATIC APPLICATION security TESTING can be used to uncover issues related to operational deployment.
Choose the CORRECT option from below list
(1)False
(2)True

Answer:-(1)False
35.

The ________ phase highlights the shift left velocity and involves choosing security tools and solutions that integrate within the developer environme

Answer»

The ________ phase highlights the shift left velocity and INVOLVES CHOOSING security tools and solutions that integrate WITHIN the developer environment.
Choose the correct OPTION from below list
(1)Operating
(2)Planning
(3)TESTING
(4)Coding

Answer:-(4)Coding

36.

SAST requires the application to be running.

Answer»

SAST requires the APPLICATION to be running.
Choose the CORRECT OPTION from below list
(1)False
(2)True

Answer:-(1)False

37.

In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?

Answer»

In SAST, during which phases are the software ARTIFACTS ANALYZED to uncover vulnerabilities?
Choose the correct option from below list
(1)Testing and DEPLOYMENT
(2)Analysis and coding
(3)Al the phases
(4)Coding and unit testing

Answer:-(4)Coding and unit testing