Your organization produces a proprietary piece of hardware of which confidentiality of the software code is critical. Considering this what type of vulnerability testing should a third-party vulnerability team be allowed to perform?
A. white box
B. black box
C. regression
D. integration
B
Explanation: Black-box testing is testing in which no information about the inner workings of the source code is shared with the tester. In this case that type of testing would maintain the confidentiality of the software code.
Computer Science & Information Technology
You might also like to view...
Why does mentally reviewing what the customer is saying help to solve a problem?
A) It demonstrates logic. B) It allows faster problem documentation. C) It allows the technician to actively listen. D) It allows the customer to vent.
Computer Science & Information Technology
___________ helps with the IP address shortage problem by allowing an organization to use private IP addresses while connected to the Internet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology