As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed?

A. Black box
B. Regression
C. White box
D. Fuzzing

Answer: C. White box

Computer Science & Information Technology

You might also like to view...

If someone has had their personal information stolen for the purposes of gaining access to their funds, he/she is said to be a victim of ________

A) identity theft B) electronic data interchange C) phishing D) fraud

Computer Science & Information Technology

Which of the following Access options sets defaults for cursor action, margins, and date formatting?

A. Object Designers B. Quick Access Toolbar C. Customize Ribbon D. Client Settings

Computer Science & Information Technology