List of questions
Related questions
Question 44 - PT0-003 discussion
A penetration tester downloads a JAR file that is used in an organization's production environment. The tester evaluates the contents of the JAR file to identify potentially vulnerable components that can be targeted for exploit. Which of the following describes the tester's activities?
A.
SAST
B.
SBOM
C.
ICS
D.
SCA
Your answer:
0 comments
Sorted by
Leave a comment first