- What security practices are related to secure coding?
- Security scanning using IDE plugins
- Security unit testing
- Static code scanning
- All of the above
- What does the tool DevSkim do?
- Reverse engineering
- It is an IDE plugin for static code scanning
- Web security scanning
- Network security
- What techniques are used to defend against memory overflow attacks?
- Stack randomization
- Nonexecution
- Exception handler protection
- All of the above
- What's the main purpose of using dependency check tools?
- Software integrity
- Implements access control
- Scans for known vulnerabilities
- Data encryption
- What security testing can Radamsa be used for?
- API fuzz testing
- Integrity monitoring
- Dynamic analysis
- Mobile application