Agile & Devops-1
Agile & Devops-1
Agile & Devops-1
2. From the options select the configuration items that are eligible
for configuration management
Select one or more:
a.Source code document
b.SRS
c.Test Report
d.Design Document
5. Tom and Peter works on the same project. Tom does his work
and update the local copy back to the configuration management
server. This process is called as
Select one:
a.Check-out
b.Check-in
c.Management
d.Baseline
Select one:
a.Scrum
b.Lean Software Development
c.Dynamic system development method,
a.Stable Cycles
b.Risk Cycles
c.Spiral Cycles
d.Sprint Cycles
Intoduction to Agile--Post-Quiz
1. What are the roles in dynamic system development method?
Choose from the following:
Select one or more:
a.Technical Coordinator
b.Designer
c.Scribe Facilitator
d.System Analyst
2. Which agile methodology divides the development into sprint
cycles, in which a Specified set of features are delivered? Choose
from the following:
Select one:
a.SCRUM
b.Extreme programming
c.Lean Software Development
10. In YAML file used for BitBucket pipeline, you can use different
types of container for each step by selecting different images
Select one:
True
False
Continuous Deployment
Continuous Integration
Continuous Delivery
Continuous Monitoring
Measurement
Motivation
Sharing
Standard
Continuous Monitoring
Continuous Deployment
Continuous Delivery
Continuous Integration
Measurement
Sharing
Automation
Culture
AWS CloudFormation
Vagrant
Terraform
Selenium
CVS
Docker
Ansible
Git
Test phase
Validate phase
Deploy phase
Build phase
2. Which of the following phases in the CI/CD pipeline get all the
features of that code from various branches of the repository,
merge them and finally use a compiler to compile it?
Testing phase
Validation phase
Build phase
Deploy phase
Terraform
Kubernetes
AWS CloudFormation
SVN
Vagrant
Bamboo
Jenkins
Puppet
Acunetix
Aqua Security
Codacy
GitLab
2. Use a SAST tool to ensure that your code is secure, safe, and
reliable.
Select one:
True False
Aqua Security
Logz.io
Contrast Security
GitLab
Threat Modeling
Remediate
Scan
Monitor
Aqua Security
SonarQube
Acunetix
Codacy
Container security
Static Analysis Security Testing
Dynamic Analysis Security Testing
Software Composition Analysis
Static Depth
Strategy
Collaboration
Intensity
True False
True False
4. _________ is incorporated in the implementation phase of
Secure SDLC.
Requirement Analysis
Architecture And Design
Development
Planning
WhiteSource
Docker
Aqua Security
Dependency Checker
Configuration Management
Component Analysis
Dynamic Analysis
Static Analysis
True False
Path manipulation
Header injection
XML external entity
Weak encryption
Veracode
Checkmarx
Klocwork
Reshift
Input/Output Validation
Code Coverage
Violation of code style guidelines
Dead or unused code
VeriBuild
Smoke
Checkmarx
Static code analyzer
Klocwork
HCL AppScan
Veracode
Checkmarx
Module
Role
Task
Playbook
Puppet
Chef
SaltStack
Vagrant
Infrastructure
Playbook
Platform
Module
Vagrant
Chef
Puppet
Terraform
OpenSCAP
ClientSpec
ServerSpec
Inspec
ServerSpec
OpenSCAP
Inspec
ClientSpec