0 votes
in Security in Containers by

While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.

a) OWASP Dependency Track

b) Burp Suite

c) OWASP Dependency Check

d) Sonar

1 Answer

0 votes
by

a) OWASP Dependency Track

Related questions

0 votes
asked Oct 5, 2022 in Security in Containers by Robindeniel
0 votes
asked Oct 5, 2022 in Security in Containers by Robindeniel
...