Okay, I've looked at the URIs and the options. I'm pretty confident that the answer is D - reconnaissance. The attacker is gathering information at this stage.
I'm a bit confused by this question. The scenario mentions that the app is triggered using an output binding on the blob, but the solution talks about using an App Service hosting plan. Aren't those two different things? I'll need to think this through carefully.
Wait, I'm a bit confused. Isn't creating the test environment also a key part of test planning? I'm not sure why that would be considered false in this case. Let me double-check the definitions to make sure I'm not missing something.
Timothy
5 months agoThurman
5 months agoNoel
6 months agoTegan
6 months agoSalome
6 months agoBronwyn
6 months agoHyman
6 months agoAudrie
6 months agoLizbeth
6 months agoCandra
6 months agoJoesph
6 months agoVilma
6 months agoLemuel
6 months agoCora
7 months agoRory
11 months agoBrittni
11 months agoBelen
10 months agoLevi
10 months agoFreeman
10 months agoAllene
10 months agoAnisha
11 months agoRamonita
10 months agoStanton
10 months agoDylan
10 months agoAudra
11 months agoTaryn
10 months agoFidelia
11 months agoBecky
11 months agoLenna
1 year agoJanet
1 year agoLenna
1 year ago