Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?
Which of the following incident response procedures would he need to perform in order to begin the analysis?