Question: Match the following activities with the correct Secure SDLC practices. Scanning source code to find vulnerabilities Secure coding practices Scanning a running application to find

Match the following activities with the correct Secure SDLC practices.
Scanning source code to find vulnerabilities
Secure coding practices
Scanning a running application to find vulnerabilities
DAST
Avoiding known coding vulnerabilities while writing source code
SAST
Tracking changes to source code
System Version Control

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!