A security manager needs to find a professional services firm to identify exploitable vulnerabilities in a running web application. The security manager should find a professional services firm that can perform:

a. Code reviews
b. Penetration testing
c. Threat modeling
d. Ethical hacking


b. Penetration testing

Computer Science & Information Technology

You might also like to view...

Values and labels can be entered automatically using the fill handle and a technique called _____.

A. fill-and-drag B. drag-and-fill C. drag-and-drop D. drag-and-paste

Computer Science & Information Technology

Which authentication method is used when you want a client to be authenticated for each session?

A. User authentication B. Session authentication C. Client authentication D. Centralized authentication

Computer Science & Information Technology

A(n) ________ typically displays all the records related to the record being examined in the main form

Fill in the blank(s) with correct word

Computer Science & Information Technology

Numerous animated GIF editors are available.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology