Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Scaled Agile SAFe-DevOps Exam - Topic 4 Question 40 Discussion

Actual exam question for Scaled Agile's SAFe-DevOps exam
Question #: 40
Topic #: 4
[All SAFe-DevOps Questions]

Ensuring that security controls such as threat modeling, application security, and penetration testing are in place throughout the Continuous Delivery Pipeline is an example of which stabilizing skill?

Show Suggested Answer Hide Answer
Suggested Answer: C

Ensuring that security controls like threat modeling, application security, and penetration testing are in place throughout the Continuous Delivery Pipeline is an example of Continuous security monitoring. This skill involves the ongoing assessment and oversight of security measures within the pipeline to ensure that the software remains secure against potential threats at all stages of its development and deployment.


Contribute your Thoughts:

0/2000 characters
Zona
8 days ago
I feel like A) Security Operations could also apply, but it’s more reactive.
upvoted 0 times
...
Shawnna
13 days ago
But without monitoring, how do we catch threats? C makes more sense.
upvoted 0 times
...
Leeann
18 days ago
I’m leaning towards B) Design for operations. Security should be integrated from the start.
upvoted 0 times
...
Jesusita
24 days ago
Agreed! Continuous security is crucial in the pipeline.
upvoted 0 times
...
Torie
29 days ago
I'm surprised this isn't more straightforward.
upvoted 0 times
...
Cathern
1 month ago
Agreed, C makes the most sense here!
upvoted 0 times
...
Rhea
2 months ago
Wait, isn't it a mix of both?
upvoted 0 times
...
Janessa
2 months ago
I think it's more about A) Security Operations.
upvoted 0 times
...
Catalina
2 months ago
Definitely C) Continuous security monitoring.
upvoted 0 times
...
Mozell
2 months ago
Haha, Failover/disaster recovery? That's like trying to put out a fire with gasoline. Continuous security monitoring is the way to keep your pipeline secure.
upvoted 0 times
...
Eladia
2 months ago
Failover/disaster recovery? Really? That's like putting a band-aid on a gunshot wound. Continuous security monitoring is where it's at.
upvoted 0 times
...
Angelyn
3 months ago
Hmm, I was thinking Design for operations, but Continuous security monitoring makes more sense. Guess I need to brush up on my DevSecOps knowledge.
upvoted 0 times
...
Sommer
3 months ago
Option C is the correct answer. Ensuring security controls throughout the Continuous Delivery Pipeline is an example of Continuous security monitoring.
upvoted 0 times
...
Catalina
3 months ago
I'm leaning towards Continuous security monitoring since it emphasizes ongoing security measures, but I could be mixing it up with another topic.
upvoted 0 times
...
German
3 months ago
I feel like this could also tie into Security Operations, but I need to double-check my notes on that.
upvoted 0 times
...
Darrel
3 months ago
I remember a practice question about security in the pipeline, and it seemed to focus on Design for operations.
upvoted 0 times
...
Jody
3 months ago
I'm not sure about this. I'll need to carefully consider how each of these security practices relates to the delivery pipeline to make the best guess.
upvoted 0 times
...
Avery
4 months ago
I'm feeling pretty confident on this one. Continuous security monitoring is the key to keeping the pipeline secure, so I'm going with C.
upvoted 0 times
...
Dalene
4 months ago
I think this might relate to Continuous security monitoring, but I'm not entirely sure.
upvoted 0 times
...
Chaya
4 months ago
I think it's C) Continuous security monitoring. It fits the context.
upvoted 0 times
...
Janessa
4 months ago
Okay, I've got this. Ensuring security controls throughout the pipeline is all about designing for operations, so I'm going with B.
upvoted 0 times
...
Kristel
4 months ago
I agree with Sommer. Continuous security monitoring is the way to go. Gotta keep those hackers at bay!
upvoted 0 times
...
Noah
5 months ago
D) Failover/disaster recovery doesn’t really connect here. It’s about prevention, not recovery.
upvoted 0 times
...
Ettie
5 months ago
Hmm, I'm a bit confused on the difference between threat modeling and penetration testing. I'll need to review those concepts before deciding on the answer.
upvoted 0 times
...
Tran
5 months ago
This seems like a tricky one. I'll need to think through the different security practices and how they fit into the delivery pipeline.
upvoted 0 times
My
3 days ago
I think it's about Continuous security monitoring.
upvoted 0 times
...
...

Save Cancel