When integrating source material from an open source project into a highly secure environment,
which of the following precautions should prevent hidden threats?
A.
Design review
B.
Code review
C.
Risk assessment
D.
Vulnerability scan
When integrating source material from an open source project into a highly secure environment,
which of the following precautions should prevent hidden threats?
When integrating source material from an open source project into a highly secure environment,
which of the following precautions should prevent hidden threats?
A.
Design review
B.
Code review
C.
Risk assessment
D.
Vulnerability scan