Which statement is true about the pricing/licensing models for HP Fortify?
A. HP offers a flexible pricing model that is optimized for the customer based on their usage scenario.
B. HP offers a standard pricing model that is the same for every organization regardless of the number of people that contribute.
C. HP offers a simple licensing model that views phases as part of a whole, rather than having a complex model that focuses on separating the phases.
D. HP will match any competitor's pricing model that an organization has been offered.
Fortify's innovative Integrated Application Security Testing (IAST) is an integration with HP
Weblnspect and which other product ?
A. HP Fortify Weblnspect Real-Time (WIRT)
B. HPArcSightESM
C. HP Fortify SecurityScope
D. HP Fortify RunTime
What are the main types of HP Fortify sales opportunities?
A. transactional opportunities and tactical opportunities
B. tactical opportunities and product-intensive opportunities
C. transactional opportunities and strategic enterprise solution opportunities
D. strategic enterprise solution opportunities and service-intensive opportunities
Which HP ESP pillar's solution detects and blocks attacks through the network?
A. HP TippingPoint
B. HP Fortify
C. HPArcSight
D. HP Atalla
What is an HP TippingPoint unique selling point for its hardware appliances?
A. designed to decrypt TLS traffic with hardware acceleration
B. market-leading, hardware-based sandboxing technology
C. designed to be an inline and proactive Intrusion Prevention System
D. designed to be a passive Network Behavior Anomaly Detection engine
Which type of qualification questions uncover the status of the customer's current software security ?
A. situation questions
B. implication questions
C. needs-payoff questions
D. problem questions
Which stage in the buyer's journey indicates when a customer is responding to a breach Compliance requirement or whether they are being proactive in their security management practice ?
A. Inflection
B. Evaluation
C. Recognition
D. Categorization
What is the process used in a security attack?
A. Discovery > Infiltration > Capture > Exfiltration
B. Research > Infiltration > Discovery > Capture > Exfiltration
C. Infiltration > Research > Capture > Discovery > Exfiltration
D. Research > Capture > Discovery > Exfiltration
A prospect calls and says that their team is small and overworked. What is the appropriate solution?
A. Fortify On Demand
B. Fortify Consultant license for SCA + Weblnspect
C. Weblnspect
D. Static Code Analyzer (SCA)
What is the name given to modern cyber attacks that organizations face and fear the most?
A. APT or Advanced Persistent Threats
B. TPA or Total Penetrating Attacks
C. ATP or Attack Targeting Protocol
D. PTA or Parallel Threshold Attacks
A prospect calls and says; "We have a short-term, immediate need to address software application issues for a security audit." What is the appropriate solution?
A. Fortify Consultant licenses for SCA + Weblnspect
B. Weblnspect
C. Static Code Analyzer (SCA)
D. Fortify On Demand (FoD)
Who are the most important cyber threat adversaries of modern time? (Select three.)
A. cyber criminals
B. spammers
C. nation states
D. script kiddies
E. hacktivists
F. competitors
A prospect calls and says; "Developers are complaining that our security testing occurs too late in the SDLC, disrupting/delaying the releases." What is the appropriate solution?
A. Weblnspect
B. Fortify Consultant license for SCA + Weblnspect
C. Fortify On Demand (FoD)
D. Static Code Analyzer (SCA)
Where should the bulk of the content appear in a proposal?
A. Scope
B. About
C. Proposal Overview
D. Problem Statement
What is a standard question to ask during the HP Fortify qualification process for new clients?
A. Which programming languages do you use?
B. Which intrusion detection system do you use?
C. Which VOIP and PBX systems do you use?
D. Which browser does your customer use?