Which Software Security Center pricing model has a minimum of 10 contributing developers?
A. Lines of Code
B. Build to Order
C. Flexible Deployment
D. Consultant
Which statement is true about the pricing/licensing models for HP Fortify?
A. HP offers a flexible pricing model that is optimized for the customer based on their usage scenario.
B. HP offers a standard pricing model that is the same for every organization regardless of the number of people that contribute.
C. HP offers a simple licensing model that views phases as part of a whole, rather than having a complex model that focuses on separating the phases.
D. HP will match any competitor's pricing model that an organization has been offered.
Which statement is correct regarding HP Fortify's place in the market?
A. Fortify secures 1,000 websites annually.
B. Fortify has been providing solutions since 2010.
C. Fortify has more than 1,000 enterprise customers.
D. Fortify has the most trial downloads annually of any of the primary SAST providers
Which type of qualification questions uncover the status of the customer's current software security ?
A. situation questions
B. implication questions
C. needs-payoff questions
D. problem questions
Which stage in the buyer's journey indicates when a customer is responding to a breach Compliance requirement or whether they are being proactive in their security management practice ?
A. Inflection
B. Evaluation
C. Recognition
D. Categorization
A prospect calls and says, "I want to bring our dynamic testing in-house." What is the appropriate solution?
A. Fortify Consultant license for SCA + Weblnspect
B. Static Code Analyzer (SCA)
C. Fortify On Demand (FoD)
D. Weblnspect
What are cyber attacks targeting?
A. intellectual property, customer data, and trade secrets
B. open records and public information
C. sample data sets and market trends
D. uncontested property knowledge
What is the name given to modern cyber attacks that organizations face and fear the most?
A. APT or Advanced Persistent Threats
B. TPA or Total Penetrating Attacks
C. ATP or Attack Targeting Protocol
D. PTA or Parallel Threshold Attacks
What is the meaning of IAST in the HP Fortify Software Security suite?
A. Integrated Application Security Testing
B. Intermittent Advanced Self-Testing
C. Integrated Application Software Testing
D. Interactive Application Security Testing