List of questions
Related questions
Question 460 - CAS-004 discussion
A company's software developers have indicated that the security team takes too long to perform application security tasks. A security analyst plans to improve the situation by implementing security into the SDLC. The developers have the following requirements:
1. The solution must be able to initiate SQL injection and reflected XSS attacks.
2. The solution must ensure the application is not susceptible to memory leaks.
Which of the following should be implemented to meet these requirements? (Select two).
A.
Side-channel analysis
B.
Protocol scanner
C.
HTTP interceptor
D.
DAST
E.
Fuzz testing
F.
SAST
G.
SCAP
Your answer:
0 comments
Sorted by
Leave a comment first