Which two elements help to secure your API keys?
Which two elements help to secure your API keys? (Choose two.) A. ramdomness B. SHA1 C. triple AES D. rotation E. dictionary
Which two elements help to secure your API keys? (Choose two.) A. ramdomness B. SHA1 C. triple AES D. rotation E. dictionary
What is as responsibility for teams running private cloud servers that is less of a concern when running in the public cloud? A. cost B. metrics and monitoring C. hardware maintenance D. credentials management
How does eliminating hardcoded or default passwords help to secure an environment? A. helps by enforcing your password in a repository and storing it in a secure vault B. helps to manage passwords centrally C. helps penetration testing team to…
Which method is a safe way to provide a username/password combination to an application running as a service in a Docker container? A. encode the value with base64 in a secure DNS CTEXT entry B. as an environment variable in…
Which type of security testing should be performed as a part of a CI/CD pipeline by analyzing the source code itself without compiling the code into a running executable? A. Dynamic Application Security Testing B. Runtime Application Health-Protection C. Continuous…
A developer is nearing the end of a software development cycle and is ready to deploy the software. The customer wants to continue using a secure software development lifecycle methodology and must plan for postproduction components. Which two areas should…
What is chaos engineering? A. designing an application with fuzzy logic that makes it hard to predict B. a product engineering approach that lacks a formal methodology C. splitting a project between teams that do not communicate with each other…
How long analysis systems such as Elasticsearch, Logstash, and Kibana Stack handle ingesting unstructured logs from different devices in various formats? A. All devices that generate syslogs must use agents that process the local logs and transmit them in a…
An end user is seeing long web page load times on the internal business application that they are trying to view. The user is seeing this issue across multiple web browsers, and other users encounter the same issue. Which action…
What are two advantages of using Configuration Management Tools? (Choose two.) A. reduction in policy violations caused by human errors B. reduction in administration costs C. reduction in network changes already performed automatically D. reduction of on-premises networking equipment E.…