Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
A.
Code review
B.
Penetration test
C.
Protocol analyzer
D.
Vulnerability scan