---Advertisement---
Digital Security

SAST – Checkmarx Interview Question-Answer

By Smart Answer

Updated on:

---Advertisement---

Q.1 Checkmarx standards include __________.

       A. Metasploit

       B. OWASP

       C. Burp

       D. None of the options

Ans : OWASP


Q.2 LOC represents ______________.

       A. Lines of code

       B. Risk level of the code

       C. Issue counts

       D. None of the options

Ans : Lines of code


Q.3 Checkmarx supports only SAST.

       A. True

       B. False

Ans : True


Q.4 Checkmarx supports the compare feature.

       A. True

       B. False

Ans : True


Q.5 Does Checkmarx help to push the source code in the following options?

       A. Web Portal

       B. CLI

       C. Jenkins

       D. None of the options

Ans : Jenkins


Q.6 The queued scan can be changed as the priority.

       A. True

       B. False

Ans : True


Q.7 Checkmarx supports mailing for pre/post scan activities.

       A. True

       B. False

Ans : True


Q.8 You can test DAST Testing using Checkmarx.

       A. True

       B. False

Ans : False


Q.9 Checkmarx supports Eclipse IDE.

       A. True

       B. False

Ans : True


Q.10 Checkmarx helps to do the auto fix for issues.

       A. True

       B. False

Ans : False


Q.11 Checkmarx supports mailing for pre/post scan activities.

       A. True

       B. False

Ans : True


Q.12 Code compare can be done via _______.

       A. Data Analysis

       B. Dashboard

       C. Project

       D. Failed Project

Ans : Data Analysis


Q.13 The flow of issues can be viewed in Open Viewer.

       A. True

       B. False

Ans : True


Q.14 A failed scan shows the reason for the failures.

       A. True

       B. False

Ans : True


Q.15 Checkmarx supports DevSecOps.

       A. True

       B. False

Ans : True


Q.16 Open Viewer helps to show _________.

       A. Priority of the issue

       B. Source code

       C. Best fix location

       D. All of the options

Ans : Priority of the issue


Q.17 Graphical Reports can be created with the help of ________.

       A. Dashboard

       B. Data Analysis

       C. Both

       D. None of the options

Ans : Data Analysis


Q.18 Locker action helps to ____________.

       A. Delete the code

       B. Analyze the code

       C. View thw code

       D. None of thee above

Ans : Analyze the code


Smart Answer

---Advertisement---

Related Post

Cyber Security Interview Question-Answer Part – 3

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 1 Cyber Security Interview Question-Answer Part – 2 Q.1 Which of the following can also consider as the ...

Cyber Security Interview Question-Answer Part – 2

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question- – 1 Cyber Security Interview Question- – 3 Q.1 Which of the following can be considered as the elements of ...

Cyber Security Interview Question-Answer

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 2 Cyber Security Interview Question-Answer Part – 3 Q.1 Which of the following refers to stealing one’s idea ...

User Authentication Interview Question-Answer part – 2

Authentication Interview Question-Answer Q.1 Which of the following is a good practice?        A. Give full permission for remote transferring        B. Grant read ...

Leave a Comment