DevOps Security Interview Question-Answer

Q.1 In the DevSecOps, during which phase of the development cycle are the security aspects considered?

       A. During the development process

       B. At the end of the release cycle

       C. Throughout the application lifecycle

       D. During the testing phase

Ans : Throughout the application lifecycle


Q.2 Which is the software development approach that first emphasized on incorporating customer feedback early and often?

       A. Agile

       B. DevOps

       C. Lean

       D. Waterfall

Ans : Agile


Q.3 ________ procedure involves integrating secure development practices and methodologies into development and deployment processes that enforce DevOps.

       A. Application Security

       B. Software development security

       C. Security Testing

       D. DevSecOps

Ans : DevSecOps


Q.4 ____________ software development approach aims to enhance the collaboration between the software development and the IT operations team.

       A. Lean

       B. Waterfall

       C. Agile

       D. DevOps

Ans : DevOps


Q.5 _________ approach aims to include security in each phase of the development cycle.

       A. Consistent Security

       B. Shift Right Security

       C. Continuous Security

       D. Shift Left security

Ans : Shift Left security


Q.6 In DevSecOps, security-related activities are the sole responsibility of the security team.

       A. True

       B. False

Ans : False


Q.7 DevSecOps encourages creativity and experimentation.

       A. True

       B. False

Ans : True


Q.8 In modern software development, a large portion of code is reused from open source and third-party libraries.

       A. True

       B. False

Ans : True


Q.9 Which of the following can be used to ensure the security of the CI/CD pipeline?

       A. Authentication to push changes

       B. Login tracking

       C. Key management

       D. Secure storage of build artifacts

       E. All the options

Ans : All the options


Q.10 How many distinct areas does the AppSec pipeline comprise?

       A. Three

       B. Two

       C. Depends on the application

       D. Four

Ans : Four


Q.11 _________ testing strategy involves feeding malformed inputs to a software.

       A. Disruption Testing

       B. Chaos Testing

       C. Fuzz Testing

Ans : Fuzz Testing


Q.12 During which phase in the AppSec pipeline are the AppSec tools automated?

       A. Testing phase

       B. Intake phase

       C. Triage phase

       D. All the options

Ans : Triage phase


Q.13 _________ simulates failure by randomly terminating clusters.

       A. Chaos Monkey

       B. Chaos Gorilla

       C. Chaos Kong

       D. Latency Monkey

Ans : Chaos Monkey


Q.14 In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test.

       A. DAST

       B. IAST

       C. RASP

       D. SAST

Ans : IAST


Q.15 RASP works as a network device.

       A. True

       B. False

Ans : False


Q.16 SAST requires the application to be running.

       A. True

       B. False

Ans : False


Q.17 Which of the following is used by IaC to code more versatile and adaptive provisioning and deployment processes?

       A. Programming scripts

       B. Descriptive language

       C. High-level or descriptive language

       D. High-level languages

Ans : High-level or descriptive language


Q.18 Which of the following can be considered as a sound monitoring approach?

       A. SEM

       B. SIEM

       C. SIM

Ans : SIEM


Q.19 In ________ type of IT setup, developers or operations teams automatically manage and provision the technology stack for an application through software.

       A. Infrastructure as Code

       B. Infrastructure automation

       C. Programming scripts

       D. Infrastructure as a Service

Ans : Infrastructure as Code


Q.20 Which of the following SAST tools analyze to uncover vulnerabilities?

       A. Source code

       B. Binaries

       C. Configuration files

       D. All the options

Ans : All the options


Q.21 In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities?

       A. Testing and deployment

       B. Analysis and coding

       C. Al the phases

       D. Coding and unit testing

Ans : Coding and unit testing


Q.22 SAST is also known as ____________.

       A. Black box testing

       B. White box testing

       C. Grey box testing

Ans : White box testing


Q.23 ____________ software development methodology characterizes security as a primary consideration throughout the processes of development and delivery of software.

       A. Continuous Security

       B. DevSecOps

       C. Rugged DevOps

       D. Secure Agile

Ans : Rugged DevOps


Q.24 Which of the following is the desirable characteristic of a useful monitoring framework?

       A. Correlation

       B. Data Aggregation

       C. Retention

       D. Alerting

       E. All the options

Ans : All the options


Q.25 What is the practice of testing the production environment continuously with different types of failure scenarios called?

       A. Chaos Testing

       B. RASP

       C. IAST

       D. Fuzz Testing

Ans : Chaos Testing


Q.26 _________ emphasizes increased trust, transparency, and a clearer understanding of probable risks.

       A. Rugged DevOps

       B. DevSecOps

Ans : Rugged DevOps


Leave a Comment