Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

Posted by: Pdfprep Category: SY0-601 Tags: , ,

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)
A . Unsecure protocols
B . Use of penetration-testing utilities
C . Weak passwords
D . Included third-party libraries
E . Vendors/supply chain
F . Outdated anti-malware software

Answer: A,D

Leave a Reply

Your email address will not be published.