Which challenges are enterprises and governments facing today?
A. The Cloud will fix all security issues; the only thing that matters will be the time to migrate.
B. Mobility is not user friendly in day-to-day life.
C. There are too many security experts available on the market. Hiring the best is extremely difficult.
D. the nature and motivation of attacks, transformation of enterprise IT and regulatory pressures
Which statement represents the vision of HP Fortify Software Security?
A. Assess > Fix > Protect
B. Assess > Assure > Report
C. Assess > Assure > Protect
D. Assess > Fix > Report
In which phase of the SDLC are the largest percentage of security defects introduced?
A. unit testing
B. field testing
C. post release
D. coding
Which statement is correct regarding HP Fortify's place in the market?
A. Fortify secures 1,000 websites annually.
B. Fortify has been providing solutions since 2010.
C. Fortify has more than 1,000 enterprise customers.
D. Fortify has the most trial downloads annually of any of the primary SAST providers
Fortify's innovative Integrated Application Security Testing (IAST) is an integration with HP
Weblnspect and which other product ?
A. HP Fortify Weblnspect Real-Time (WIRT)
B. HPArcSightESM
C. HP Fortify SecurityScope
D. HP Fortify RunTime
Which HP Fortify solution has a pricing model with basic standard, and premium options?
A. Fortify On Demand Static
B. Fortify On Demand Dynamic
C. Build To Order
D. Software Security Center
Which stage in the buyer's journey indicates when a customer is responding to a breach Compliance requirement or whether they are being proactive in their security management practice ?
A. Inflection
B. Evaluation
C. Recognition
D. Categorization
What is the process used in a security attack?
A. Discovery > Infiltration > Capture > Exfiltration
B. Research > Infiltration > Discovery > Capture > Exfiltration
C. Infiltration > Research > Capture > Discovery > Exfiltration
D. Research > Capture > Discovery > Exfiltration
A prospect calls and says, "I want to bring our dynamic testing in-house." What is the appropriate solution?
A. Fortify Consultant license for SCA + Weblnspect
B. Static Code Analyzer (SCA)
C. Fortify On Demand (FoD)
D. Weblnspect
What are cyber attacks targeting?
A. intellectual property, customer data, and trade secrets
B. open records and public information
C. sample data sets and market trends
D. uncontested property knowledge
A prospect calls and says; "We have a short-term, immediate need to address software application issues for a security audit." What is the appropriate solution?
A. Fortify Consultant licenses for SCA + Weblnspect
B. Weblnspect
C. Static Code Analyzer (SCA)
D. Fortify On Demand (FoD)
Who are the most important cyber threat adversaries of modern time? (Select three.)
A. cyber criminals
B. spammers
C. nation states
D. script kiddies
E. hacktivists
F. competitors
A prospect calls and says; "Developers are complaining that our security testing occurs too late in the SDLC, disrupting/delaying the releases." What is the appropriate solution?
A. Weblnspect
B. Fortify Consultant license for SCA + Weblnspect
C. Fortify On Demand (FoD)
D. Static Code Analyzer (SCA)
Which opportunity type often uses Customization Services to ensure success?
A. Fortify on Demand
B. Product-Intensive
C. Strategic/Full Solution
D. Tactical
Match the opportunity types with the characteristics of customs.
Hot Area: