Which of the following statements are TRUE? (Choose two options)
DAST tools requires a running application to find the vulnerabilities.
DAST can be very effective during the "Code Development" phase of the SDLC
Threat modelling involves reviewing the source code to identify potential security issues.
Threat modelling involves reviewing the design diagrams (such as Data Flow Diagrams) to identify potential security issues.
To get all Infosys Certified Application Security Specialist Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee