The most frequently used method to identify hidden vulnerabilities is a ____.
A. code execution
B. design review
C. code inspection
D. sandbox review
Answer: C
Computer Science & Information Technology
You might also like to view...
What is the Accessibility Checker used for in PowerPoint?
What will be an ideal response?
Computer Science & Information Technology
Objects that are part of an Access database are available from the ________ within Access
Fill in the blank(s) with correct word
Computer Science & Information Technology