What security practices are related to secure coding?
Security scanning using IDE plugins
Security unit testing
Static code scanning
All of the above
What does the tool DevSkim do?
Reverse engineering
It is an IDE plugin for static code scanning
Web security scanning
Network security
What techniques are used to defend against memory overflow attacks?
Stack randomization
Nonexecution
Exception handler protection
All of the above
What's the main purpose of using dependency check tools?
Software integrity
Implements access control
Scans for known vulnerabilities
Data encryption
What security testing can Radamsa be used for?
API fuzz testing
Integrity monitoring
Dynamic analysis
Mobile application
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.