
Question: 1
Which type of threat occur when an attacker can send hostile data to an interpreter within an
application?
A. Cross-site scripting
B. Sensitive data exposure
C. Broken authentication
D. Injection
Answer: D
Question: 2
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)
A. An artifact repository allows to compare and merge changes in the source code of files involved in a build...