Refer to the exhibit. Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
Correct Answer:
DE
Which two countermeasures help reduce the risk of playback attacks? (Choose two.)
Correct Answer:
BE
Which two strategies are used to protect personally identifiable information? (Choose two.)
Correct Answer:
AB
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?
Correct Answer:
B
Which two statements describe advantages of static code analysis over unit tests? (Choose two.)
Correct Answer:
BC