In the coding phase, what is the most common verification approach?

A. Penetration testing
B. Informal review
C. Desk check
D. Audit

Answer: C

Computer Science & Information Technology

You might also like to view...

________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation

A) Keyloggers B) Cyberstalkers C) Hackers D) Identity thieves

Computer Science & Information Technology

Details around how a retinal scanner is used would be found in the acceptable use section of a security policy

Indicate whether the statement is true or false

Computer Science & Information Technology