While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
a) OWASP Dependency Track
b) Burp Suite
c) OWASP Dependency Check
d) Sonar