Which one of the following is not a component of the DevOps model? Information security
A
Information security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provided by the users are accurate dates to prevent security issues. What technique should Bob use? Input validation
A
Input validation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What portion of the change management process allows developers to prioritize tasks? Request control
A
Request control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What approach to failure management places the system in a high level of security? Fail-secue
A
Fail-secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What software development model uses a seven-stage approach with a feedback loop that allows progress one step backward? Waterfall
A
Waterfall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What form of access control is concerned primarily with the data stored by a field? Content-dependent
A
Content-dependent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which one of the following key types is used to enforce referential integrity between database tables? Foreign key
A
Foreign key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of? Aggregation
A
Aggregation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What database technique can be used to prevent unauthorized users from determining classified information by noticing the absence of information normally available to them? Polyinstantiation
A
Polyinstantiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which one of the following is not a principle of Agile development? A series of “if/then” rules codified in a knowledge base
A
A series of “if/then” rules codified in a knowledge base