Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan
Explanation:
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan
Explanation: