Which statement is true about whiteboard selling?
A. It takes place right before drafting a proposal so the organization has a clear understanding of what they will be agreeing to.
B. It is not as engaging as a formal presentation, but it takes less time to prepare and present.
C. It should not be used too frequently because many organizations find it too informal.
D. It takes place during the evaluation of options stage.
Which challenges are enterprises and governments facing today?
A. The Cloud will fix all security issues; the only thing that matters will be the time to migrate.
B. Mobility is not user friendly in day-to-day life.
C. There are too many security experts available on the market. Hiring the best is extremely difficult.
D. the nature and motivation of attacks, transformation of enterprise IT and regulatory pressures
What are the main types of HP Fortify sales opportunities?
A. transactional opportunities and tactical opportunities
B. tactical opportunities and product-intensive opportunities
C. transactional opportunities and strategic enterprise solution opportunities
D. strategic enterprise solution opportunities and service-intensive opportunities
Which stage in the buyer's journey indicates when a customer is responding to a breach Compliance requirement or whether they are being proactive in their security management practice ?
A. Inflection
B. Evaluation
C. Recognition
D. Categorization
A prospect calls and says that their team is small and overworked. What is the appropriate solution?
A. Fortify On Demand
B. Fortify Consultant license for SCA + Weblnspect
C. Weblnspect
D. Static Code Analyzer (SCA)
A prospect calls and says; "We have a short-term, immediate need to address software application issues for a security audit." What is the appropriate solution?
A. Fortify Consultant licenses for SCA + Weblnspect
B. Weblnspect
C. Static Code Analyzer (SCA)
D. Fortify On Demand (FoD)
What is the security approach that HP ESP adopted from Lockheed-Martin's Computer Emergency Response Team to disrupt the adversary?
A. the Kill Chain
B. the Destructor
C. the Internal Emergency Response Team
D. Detect it; Contain it, Stop it
Where should the bulk of the content appear in a proposal?
A. Scope
B. About
C. Proposal Overview
D. Problem Statement
Which defect management system is among the default integrations with HP Fortify solutions?
A. BugTracker.NET
B. GitHub
C. SourceForge
D. HPALM
What is the goal of HP Fortify's Software Security Suite?
A. Find security vulnerabilities in any type of software, fix security flaws in source code before it ships, and protect applications against attacks in production.
B. Find security vulnerabilities in any type of software, fix security flaws in source code before it ships, and prepare perimeter defense systems with an application context.
C. Find security vulnerabilities in Web applications, upload findings to ArcSight EMS SIEM, and block the intruder at the gate.
D. Detect security vulnerabilities during exploitation by using Runtime, upload findings to ArcSight EMS SIEM, and block the intruder at the gate.