You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-applications/9-knowledge-check.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -31,8 +31,8 @@ quiz:
31
31
choices:
32
32
- content: "A practice that ensures system uptime by maintaining optimal replica volumes."
33
33
isCorrect: false
34
-
explanation: "DevSecOps isn't concerned with replica volumes of systems, which refers to replication strategies used in high availability deployment scenarios."
35
-
- content: "A security model used by developers to certify that code changes do not affect production environments."
34
+
explanation: "DevSecOps isn't concerned with replica volumes of systems, which refer to replication strategies used in high availability deployment scenarios."
35
+
- content: "A security model used by developers to certify that code changes don't affect production environments."
36
36
isCorrect: false
37
37
explanation: "There's no certification process involved in DevSecOps. The idea behind DevSecOps is that security mechanisms are integrated throughout the development cycle to increase the overall security posture."
38
38
- content: "A set of principles designed to integrate security testing and evaluation into the software development lifecycle (SDLC)."
@@ -59,7 +59,7 @@ quiz:
59
59
explanation: "Subscription keys can be passed through Azure Front Door and Application Gateway. The limitation is that they don't identify individual callers, not that they're incompatible with other Azure services."
60
60
- content: "Because subscription keys can only authenticate requests from Azure-hosted applications."
61
61
isCorrect: false
62
-
explanation: "Subscription keys can be used by any API consumer regardless of where the application is hosted. The issue is that they are shared secrets that don't provide individual caller identification."
62
+
explanation: "Subscription keys can be used by any API consumer regardless of where the application is hosted. The issue is that they're shared secrets that don't provide individual caller identification."
63
63
- content: "What type of threats is the Azure web application firewall designed to protect against?"
64
64
choices:
65
65
- content: "Server-level attacks such as shared hosting violations"
0 commit comments