Qtr No. 213, New Town Yehlanka Indore 454775
Which of the following statements are TRUE? (Choose two options)
DAST tools requires a running application to find the vulnerabilities.
DAST can be very effective during the "Code Development" phase of the SDLC
Threat modelling involves reviewing the source code to identify potential security issues.
Threat modelling involves reviewing the design diagrams (such as Data Flow Diagrams) to identify potential security issues.
To get all Infosys Certified Application Security Specialist Exam questions Join Group https://bit.ly/infy_premium_group
We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.
Qtr No. 213, New Town Yehlanka Indore 454775
admin@prepflix.in