exam questions

Exam AZ-400 All Questions

View all questions & answers for the AZ-400 exam

Exam AZ-400 topic 4 question 49 discussion

Actual exam question from Microsoft's AZ-400
Question #: 49
Topic #: 4
[All AZ-400 Questions]

DRAG DROP -
You need to increase the security of your team's development process.
Which type of security tool should you recommend for each stage of the development process? To answer, drag the appropriate security tools to the correct stages. Each security tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Box 1: Threat modeling -
Threat modeling's motto should be, ג€The earlier the better, but not too late and never ignore.ג€
Box 2: Static code analysis -
Validation in the CI/CD begins before the developer commits his or her code. Static code analysis tools in the IDE provide the first line of defense to help ensure that security vulnerabilities are not introduced into the CI/CD process.
Box 3: Penetration testing -
Once your code quality is verified, and the application is deployed to a lower environment like development or QA, the process should verify that there are not any security vulnerabilities in the running application. This can be accomplished by executing automated penetration test against the running application to scan it for vulnerabilities.
Reference:
https://docs.microsoft.com/en-us/azure/devops/articles/security-validation-cicd-pipeline?view=vsts

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rengs
Highly Voted 3 years, 10 months ago
Static code Static code Penetration https://docs.microsoft.com/en-us/azure/devops/migrate/security-validation-cicd-pipeline?view=azure-devops#ide--pull-request
upvoted 70 times
rdemontis
3 years, 2 months ago
totally agree with you
upvoted 1 times
...
ZodiaC
3 years, 10 months ago
1000% CORRECT
upvoted 5 times
...
...
PlumpyTumbler
Highly Voted 3 years, 3 months ago
The officially sanctioned practice test for this exam on measureup.com has this question. The answers are Pull Request: Static code analysis CI: package vulnerability CD: Pentest That means that Microsoft recognizes those as the correct answers. If the newest version of the test says package vulnerability instead of threat modeling, choose it.
upvoted 27 times
xRiot007
1 year, 10 months ago
Threat modeling is one thing, vulnarability scanning is a totally other thing. Vulnerability scanning is part of static scans, so first 2 points are SCA, SCA, then you do penetration testing during Continuous Delivery, after the build is over.
upvoted 1 times
...
...
ozbonny
Most Recent 1 year, 2 months ago
maybe this could be the explanation of examtopics Threat modeling is typically conducted during the design and planning phases of software development to identify potential security threats and vulnerabilities in a system. While it's not common to perform threat modeling directly within a pull request (PR) itself, the findings from threat modeling activities can certainly inform the development process, including code reviews and pull requests.
upvoted 2 times
...
ozbonny
1 year, 2 months ago
According with this documentation I think is static code static code penetration https://learn.microsoft.com/en-us/training/modules/static-analyzers/4-manage-technical-debt-sonarcloud-azure-devops https://www.imperva.com/learn/application-security/penetration-testing/
upvoted 1 times
...
ozbonny
1 year, 2 months ago
According with this documentation I think is static code static code penetration https://learn.microsoft.com/en-us/training/modules/static-analyzers/4-manage-technical-debt-sonarcloud-azure-devops
upvoted 1 times
...
CirusD
1 year, 7 months ago
Pull Request: Static code analysis Continuous Integration: Threat modelling Continuous Delivery: Penetration testing
upvoted 1 times
...
yana_b
1 year, 9 months ago
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#static-application-security-testing https://learn.microsoft.com/en-us/azure/devops/pipelines/security/overview?view=azure-devops#ide--pull-request Seems that Box1 should be static code. The other 2 answer options seem to be correct.
upvoted 1 times
...
ieboaix
1 year, 9 months ago
Threat modeling is recommended to be done in design & planning stage. according to OWASP some refined measures can also be done in other stages. CI CD should only have automated tools, PR is possible, but if ask a recommendation, it should be done before PR. so it should be Static code Static code Penetration
upvoted 2 times
...
zellck
1 year, 11 months ago
1. Static code analysis 2. Static code analysis 3. Penetration testing https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#static-application-security-testing But a team must start somewhere when implementing static code scanning practices. One way is to introduce static code analysis inside of continuous integration. This method verifies security as soon as code changes happen. One example is SonarCloud. It wraps multiple static application security testing (SAST) tools for different languages. SonarCloud assesses and tracks technical debt with a focus on maintainability. It looks at code quality and style and has security-specific checkers. But there are many other commercial and open-source tools available in the market.
upvoted 5 times
...
dmeld
2 years, 6 months ago
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls The given answer is correct. Pull requests are standard in the development process. Part of the pull request process is peer reviews that often reveal undiscovered defects, bugs, or issues related to human mistakes. It's good practice to have a security champion or knowledgeable security teammate who can guide the developer during the peer review process before creating a pull request. Secure coding practice guidelines help developers learn essential secure coding principles and how they should be applied. There are secure coding practices available, such as OWASP secure coding practices to incorporate with general coding practices.
upvoted 3 times
Mattt
1 year ago
I also blieve that the given answer is correct.
upvoted 1 times
...
...
syu31svc
2 years, 9 months ago
Did a course on Cloud Guru Answer is as follows Pull request ---> static code analysis Continuous Integration ---> static code analysis Continuous delivery ---> Penetration testing
upvoted 6 times
...
Govcomm
2 years, 10 months ago
Thread modelling Static code analysis Penetration testing
upvoted 2 times
...
Inland
2 years, 11 months ago
Given answers are correct. https://www.synopsys.com/blogs/software-security/threat-modeling-sdlc/#:~:text=While%20threat%20modeling%20should%20take,modeling%20within%20the%20support%20cycle. https://docs.microsoft.com/en-us/azure/security/develop/security-code-analysis-overview
upvoted 1 times
...
Eltooth
3 years ago
Static Static Pen test
upvoted 3 times
...
Cheehp
3 years, 1 month ago
Selected during exam. Static code analysis Static code analysis Penetration testing
upvoted 6 times
...
d0bermannn
3 years, 7 months ago
Static code Threat modeling Penetration
upvoted 2 times
...
sanhoo
3 years, 10 months ago
Threat modeling: - It is usually a manual process and done as part of PR review Static code- During the build phase using tools like sonarqube Penetration:- once code is build and ready for deployment we check if the that it is free from web attacks
upvoted 13 times
xRiot007
1 year, 10 months ago
Wrong. This is what threat modelling is : https://www.synopsys.com/glossary/what-is-threat-modeling.html#E
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago