Which of the following assessments would Pete, the security administrator, use to actively test that an applications security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan
Which of the following assessments would Pete, the security administrator, use to actively test that an applications security controls are in place?
Which of the following assessments would Pete, the security administrator, use to actively test that an applications security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan