A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code.Which of the following assessment techniques is BEST described in the analyst's report?

A. Architecture evaluation
B. Baseline reporting
C. Whitebox testing
D. Peer review

Answer: D. Peer review

Computer Science & Information Technology

You might also like to view...

Which of the following are rules that ensure a correct recursive function?

a) Each stopping case must perform a correct action (or return the correct value for stopping case) for the condition that invokes it. b) The recursion must make no more than 1000 recursive calls. c) The chain of recursive calls eventually must reach one of the stopping cases. d) The size of the problem solved by the successive recursions must each be larger than the last. e) For cases that involve recursion: If each recursive calls correctly solve the subproblem (or return the correct value for the subproblem) it solve, then the final

Computer Science & Information Technology

The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology