There is reason to believe that a recently modified web application has allowed unauthorized access. Which is
the BEST way to identify an application backdoor?
A.
Black box pen test
B.
Security audit
C.
Source code review
D.
Vulnerability scan
There is reason to believe that a recently modified web application has allowed unauthorized access. Which is
the BEST way to identify an application backdoor?
There is reason to believe that a recently modified web application has allowed unauthorized access. Which is
the BEST way to identify an application backdoor?
A.
Black box pen test
B.
Security audit
C.
Source code review
D.
Vulnerability scan