You are responsible for security at a company that uses a lot of Web applications. You are most
concerned about flaws in those applications allowing some attacker to get into your network. What
method would be best for finding such flaws?
A.
Vulnerability scanning
B.
Manual penetration testing
C.
Automated penetration testing
D.
Code review
Explanation: