You want to scan and bundle the results for a Java application and only have access to one machine.
Which two components must be installed on that machine to execute a scan and bundle the results?
You are analyzing a client-server application that has "thick" clients that run on Windows and Android. You come across several Remote Command Execution findings with data originating from several different Sources. The customer you are working with is worried about the developers pushing back on low priority findings, so you need to remove those originating from sources that pose the lowest risk. Which Sources pose the lowest risk?
When reviewing an application, you discover methods that are not called directly by the application. Which rule should be applied in order to scan this code?