This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions.
What should a continuous security approach include?
Manual remediation in environments with combined legacy and modern application platforms
Secure software delivery, secure infrastructure and secure automation
Distributed denial of service, mobile malware, DNS
Which defensive mindset is appropriate to take?
With enough automation of security checks in the continuous delivery system, you will be able to protect the majority of threats.
Defensive mechanisms are layered to protect valuable data and information.
High tech companies are less likely to be attacked.
What are three principles of DevOps that most apply to continuous security?
Shift left, automation and continuous improvement
Customer-focused design, OKRs, metrics
Continuous operations, lean product and shift-right testing
Continuous Operations reduces or eliminates the need for planned downtimes or interruptions, such as scheduled maintenance. What should continuous monitoring of infrastructure, applications, and services be tied to, if possible?
Security scanning
Sprint planning
Automated remediation
A large part of the value of DevOps in general is about finding the right balance between which of the following?
Innovation (speed) and business continuity (control)
Discussion (iteration) and implementation (deployment)
Estimation (planning) and achievability (results)
You must answer all questions before checking your work.
Was this page helpful?