Which of the following statements are TRUE? (Choose two options)

DAST tools requires a running application to find the vulnerabilities.

DAST can be very effective during the "Code Development" phase of the SDLC

Threat modelling involves reviewing the source code to identify potential security issues.

Threat modelling involves reviewing the design diagrams (such as Data Flow Diagrams) to identify potential security issues.

Correct Option - ad

To get all Infosys Certified Application Security Specialist Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in