Q: 11
(Kenneth Danziger is a certified DevSecOps engineer, and he recently got a job in an IT company that
develops software products related to the healthcare industry. To identify security and compliance
issues in the source code and quickly fix them before they impact the source code, Kenneth would
like to integrate WhiteSource SCA tool with AWS. Therefore, to integrate WhiteSource SCA Tool in
AWS CodeBuild for initiating scanning in the code repository, he built a buildspec.yml file to the
source code root directory and added the following command to pre-build phase curl -LJO
https://github.com/whitesource/unified-agent-distribution/raw/master/standAlone/wss_agent.sh.
Which of the following script files will the above step download in Kenneth organization’s CodeBuild
server?.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
(Scott Morrison is working as a senior DevSecOps engineer at SUTRE SOFT Pvt. Ltd. His organization
develops software and applications for IoT devices. Scott created a user story; he then created abuser
stories under the user story. After that, he created threat scenarios under the abuser story, and then
he created test cases for the threat scenarios. After defining the YAML, Scott would like to push the
user-story driven threat model to the ThreatPlaybook server. Which of the following command Scott
should use?.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
(Debra Aniston is a DevSecOps engineer in an IT company that develops software products and web
applications. Her team has found various coding issues in the application code. Debra would like to
fix coding issues before they exist. She recommended a DevSecOps tool to the software developer
team that highlights bugs and security vulnerabilities with clear remediation guidance, which helps
in fixing security issues before the code is committed. Based on the information given, which of the
following tools has Debra recommended to the software development team?)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
(James Harden has been working as a senior DevSecOps engineer in an IT company located in
Oakland, Californi
a. To detect vulnerabilities and to evaluate attack vectors compromising web applications, he would
like to integrate Burp Suite with Jenkins. He downloaded the Burp Suite Jenkins plugins and then
uploaded the plugin and successfully integrated Burp Suite with Jenkins. After integration, he would
like to scan web application using Burp Suite; therefore, he navigated to Jenkins’ dashboard, opened
an existing project, and clicked on Configure. Then, he navigated to the Build tab and selected
Execute shell from Add build step. Which of the following commands should James enter under the
Execute shell?.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
(Judi Dench has recently joined an IT company as a DevSecOps engineer. Her organization develops
software products and web applications related to electrical engineering. Judi would like to use
Anchore tool for container vulnerability scanning and Software Bill of Materials (SBOM) generation.
Using Anchore grype, she would like to scan the container images and file systems for known
vulnerabilities, and would like to find vulnerabilities in major operating system packages such as
Alpine, CentOS, Ubuntu, etc. as well as language specific packages such as Ruby, Java, etc. Which of
the following commands should Judi run to scan for vulnerabilities in the image using grype?)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
(Michael Rady recently joined an IT company as a DevSecOps engineer. His organization develops
software products and web applications related to online marketing. Michael deployed a web
application on Apache server. He would like to safeguard the deployed application from diverse
types of web attacks by deploying ModSecurity WAF on Apache server. Which of the following
command should Michael run to install ModSecurity WAF?)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
(Charles Drew has been working as a DevSecOps team leader in an IT company located in Nashville,
Tennessee. He would like to look at the applications from an attacker’s perspective and make
security a part of the organizations’ culture. Imagine, you are working under Charles as a DevSecOps
engineer. Charles has asked you to install ThreatPlaybook, which is a unified DevSecOps Framework
that allows you to go from iterative, collaborative threat modeling to application security testing
orchestration. After installation, you must configure ThreatPlaybook CLI; therefore, you have created
a directory for the project and then you go to the current directory where you would like to configure
ThreatPlaybook. Which of the following commands will you use to configure ThreatPlaybook? (Here,
represents your email id; represents IP address; and represents
the nginx port.))
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
(Alexander Hamilton has been working as a senior DevSecOps engineer in an IT company located in
Greenville, South Carolin
a. In January of 2012, his organization because a victim of a cyber security attack and incurred a
tremendous loss. Alexander’s organization immediately adopted AWS cloud-based services after the
attack to develop robust software products securely and quickly. To detect security issues in code
review, Alexander would like to integrate SonarQube with AWS Pipeline; therefore, he created a
pipeline in AWS using CloudFormation pipeline template. Then, he selected SonarQube tool from the
tools dropdown, provided the required stack parameters, and also provided email address for
receiving email notifications of changes in pipeline status and approvals. He deployed the pipeline
after entering the required information. What will happen when changes are committed in the
application repository?.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
(Terry Diab has been working as a DevSecOps engineer in an IT company that develops software
products and web applications for a call center. She would like to integrate Snyk with AWS
CodeCommit to monitor and remediate vulnerabilities in the code repository. Terry pushed code to
AWS CodeCommit; this triggered Amazon EventBridge Rule, which then triggered AWS CodePipeline.
AWS CodePipeline passed code to Snyk CLI run. Who among the following interacts with Snyk CLI and
sends the results to Snyk UI?)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
(SinCaire is a software development company that develops web applications for various clients. To
measure the successful implementation of DevSecOps, the organization enforced U.S. General
Service Administrator (GSA) high-value DevSecOps metrics. Which of the following metrics
implemented by SinCaire can measure the time between the code commit and production, and
tracks the bug fix and new features throughout the development, testing, and production phases?)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2