In the coding phase, what is the most common verification approach?
A. Penetration testing
B. Informal review
C. Desk check
D. Audit
Answer: C
Computer Science & Information Technology
You might also like to view...
________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation
A) Keyloggers B) Cyberstalkers C) Hackers D) Identity thieves
Computer Science & Information Technology
Details around how a retinal scanner is used would be found in the acceptable use section of a security policy
Indicate whether the statement is true or false
Computer Science & Information Technology