Skip to content

Commit af6ddbf

Browse files
committed
fix for acronlinx
1 parent d14a2a8 commit af6ddbf

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

learn-pr/wwl-sci/design-solutions-secure-applications/9-knowledge-check.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ quiz:
3131
choices:
3232
- content: "A practice that ensures system uptime by maintaining optimal replica volumes."
3333
isCorrect: false
34-
explanation: "DevSecOps isn't concerned with replica volumes of systems, which refers to replication strategies used in high availability deployment scenarios."
35-
- content: "A security model used by developers to certify that code changes do not affect production environments."
34+
explanation: "DevSecOps isn't concerned with replica volumes of systems, which refer to replication strategies used in high availability deployment scenarios."
35+
- content: "A security model used by developers to certify that code changes don't affect production environments."
3636
isCorrect: false
3737
explanation: "There's no certification process involved in DevSecOps. The idea behind DevSecOps is that security mechanisms are integrated throughout the development cycle to increase the overall security posture."
3838
- content: "A set of principles designed to integrate security testing and evaluation into the software development lifecycle (SDLC)."
@@ -59,7 +59,7 @@ quiz:
5959
explanation: "Subscription keys can be passed through Azure Front Door and Application Gateway. The limitation is that they don't identify individual callers, not that they're incompatible with other Azure services."
6060
- content: "Because subscription keys can only authenticate requests from Azure-hosted applications."
6161
isCorrect: false
62-
explanation: "Subscription keys can be used by any API consumer regardless of where the application is hosted. The issue is that they are shared secrets that don't provide individual caller identification."
62+
explanation: "Subscription keys can be used by any API consumer regardless of where the application is hosted. The issue is that they're shared secrets that don't provide individual caller identification."
6363
- content: "What type of threats is the Azure web application firewall designed to protect against?"
6464
choices:
6565
- content: "Server-level attacks such as shared hosting violations"

0 commit comments

Comments
 (0)