The XYZ company is contracting with a third party to develop a new credit card processing application. Which of the following steps should the company take to ensure that the application is secure?

A. line-by-line code review and simulation
B. technical exchange meetings
C. pilot trial
D. phased rollout


A
Explanation: For an application processing sensitive data like credit card data, the best approach would be a line-by-line code review and simulation.

Computer Science & Information Technology

You might also like to view...

Unlike regular variables, __________ can hold multiple values.

a. constants b. named constants c. arrays d. floats e. None of these

Computer Science & Information Technology

Which of the following describes morphing in Flash?

A. Creating a tween animation B. Altering an object's form as part of a shape tween C. Moving an object from one frame to another frame D. Using the ease out command to make an object appear faster

Computer Science & Information Technology

A Label object can be centered on the Windows Form object by using choices on the ____ menu.

A. File B. Edit C. Format D. Tools

Computer Science & Information Technology

Together, what are viruses, Trojans, and worms called?

A. Encrypted software B. Open source software C. Malware D. Spyware

Computer Science & Information Technology