Which of the following security controls will you use for the deployment phase of the SDLC to build secure software?
Which of the following authentication methods prevents unauthorized execution of code on remote systems?