Okay, I've looked at the URIs and the options. I'm pretty confident that the answer is D - reconnaissance. The attacker is gathering information at this stage.
I'm a bit confused by this question. The scenario mentions that the app is triggered using an output binding on the blob, but the solution talks about using an App Service hosting plan. Aren't those two different things? I'll need to think this through carefully.
Wait, I'm a bit confused. Isn't creating the test environment also a key part of test planning? I'm not sure why that would be considered false in this case. Let me double-check the definitions to make sure I'm not missing something.
Timothy
4 months agoThurman
4 months agoNoel
4 months agoTegan
4 months agoSalome
4 months agoBronwyn
5 months agoHyman
5 months agoAudrie
5 months agoLizbeth
5 months agoCandra
5 months agoJoesph
5 months agoVilma
5 months agoLemuel
5 months agoCora
5 months agoRory
9 months agoBrittni
9 months agoBelen
8 months agoLevi
8 months agoFreeman
8 months agoAllene
8 months agoAnisha
10 months agoRamonita
8 months agoStanton
8 months agoDylan
9 months agoAudra
10 months agoTaryn
9 months agoFidelia
9 months agoBecky
10 months agoLenna
11 months agoJanet
11 months agoLenna
11 months ago