The most frequently used method to identify hidden vulnerabilities is a ____.

A. code execution
B. design review
C. code inspection
D. sandbox review

Answer: C

Computer Science & Information Technology

You might also like to view...

What is the Accessibility Checker used for in PowerPoint?

What will be an ideal response?

Computer Science & Information Technology

Objects that are part of an Access database are available from the ________ within Access

Fill in the blank(s) with correct word

Computer Science & Information Technology