Its C, credential Scanning .
A frequently occurring problem in security is the storage of credentials such as passwords and access keys in source
code, or configuration or other files. This creates the risk that those credentials—which should never be shared—are
exposed to people who do not have permission to access them. This could lead to the organization’s application or
data being vulnerable. Credential scanning tools search source code for credentials to make sure they are not
inadvertently checked in with code.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
339dfab
4Â weeks, 1Â day ago4f2a581
3Â months, 2Â weeks agoApsw2015
6Â months, 3Â weeks ago