Q: 17
A Chief Information Security Officer wants to implement security by design, starting ……
vulnerabilities, including SQL injection, FRI, XSS, etc. Which of the following would most likely meet
the requirement?
Options
Discussion
Its C, DAST specifically goes after those runtime vulnerabilities like SQLi and XSS. The other options don't really fit what's being asked.
Nah, I don't think it's D. C hits those runtime issues (SQLi, XSS) and supports security by design. D is more about fixing errors, not full vulnerability testing. Trap answer for sure.
C, DAST is used for runtime vulnerability scanning like SQLi and XSS, so pretty confident here.
C tbh, DAST targets exactly those issues in active apps so fits security by design here.
Be respectful. No spam.