As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed?
A. Black box
B. Regression
C. White box
D. Fuzzing
Answer: C. White box
Computer Science & Information Technology
You might also like to view...
If someone has had their personal information stolen for the purposes of gaining access to their funds, he/she is said to be a victim of ________
A) identity theft B) electronic data interchange C) phishing D) fraud
Computer Science & Information Technology
Which of the following Access options sets defaults for cursor action, margins, and date formatting?
A. Object Designers B. Quick Access Toolbar C. Customize Ribbon D. Client Settings
Computer Science & Information Technology