A security manager needs to find a professional services firm to identify exploitable vulnerabilities in a running web application. The security manager should find a professional services firm that can perform:

a. Code reviews
b. Penetration testing
c. Threat modeling
d. Ethical hacking

b. Penetration testing

Computer Science & Information Technology

You might also like to view...

A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use?

A. Hash function B. Elliptic curve C. Symmetric algorithm D. Public key cryptography

Computer Science & Information Technology

Credentials that are authenticated primarily through the operating system must have an account residing on that particular operating system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology