A. Response Raw
B. Response Cookies
C. Response Headers
D. Request Raw
A. One controls the proxy port opened by WebInspect during Manual Step-Mode Crawl and the other controls the network path towards its scan targets.
B. One controls the network path towards its scan targets and the other controls the network path to the scan data repository.
C. One controls the network path WebInspect uses to reach the Internet for updates and licensing, and the other controls the network path taken towards its scan targets.
D. One controls the network path to access AMP and the other controls access to the Internet.
A. Retinal Scan
B. htaccess
C. NTLM
D. Kerberos
E. Cybersafe
F. HTTP Basic
A. Right click vulnerability -> select Annotate -> Mark as False Positive
B. Right click vulnerability -> select Ignore Vulnerability -> Mark as False Positive
C. Right click vulnerability -> select Change Vulnerability Severity -> Mark as False Positive
D. Right click vulnerability -> select Edit Vulnerability -> Mark as False Positive
A. The values entered into a parameter designated as a Smart Credential will be encrypted during the scan.
B. The values entered into a parameter designated as a Smart Credential allow WebInspect to use digital certificates to authenticate to the server.
C. Designating a parameter as a Smart Credential causes a user to be prompted for an input during the execution of the scan.
D. Smart Credentials will apply Authentication values used during the scan.
A. HEAD
B. POST
C. UPLOAD
D. LIST
E. ACCEPT
A. enable Traffic Monitor in settings, complete scan, and export the scan with logs
B. enable Traffic Monitor in settings, complete scan, and export scan file
C. run scan with default settings then export the scan with logs
D. export scan file and import to another copy of WebInspect
A. Best Practice
B. Compliance
C. Hazardous
D. Assault
A. via the WebInspect toolkit
B. via the Advanced Assessment panel
C. via the scheduler.exe program
D. via the wi.exe program
A. Find the folder where scan data is stored and find the correct scan file.
B. Open the Scan and look at Scan ID in Scan Log .
C. Open the Scan and look at the Scan Properties.
D. Run the Scan Statistics report on the scan.