List of questions
Related questions
Question 110 - SY0-601 discussion
Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)
A.
Unsecure protocols
B.
Use of penetration-testing utilities
C.
Weak passwords
D.
Included third-party libraries
E.
Vendors/supply chain
F.
Outdated anti-malware software
Your answer:
0 comments
Sorted by
Leave a comment first