List of questions
Related questions
Question 233 - SY0-701 discussion
Which of the following methods would most likely be used to identify legacy systems?
A.
Bug bounty program
B.
Vulnerability scan
C.
Package monitoring
D.
Dynamic analysis
Your answer:
0 comments
Sorted by
Leave a comment first