The XYZ company is contracting with a third party to develop a new credit card processing application. Which of the following steps should the company take to ensure that the application is secure?
A. line-by-line code review and simulation
B. technical exchange meetings
C. pilot trial
D. phased rollout
A
Explanation: For an application processing sensitive data like credit card data, the best approach would be a line-by-line code review and simulation.
You might also like to view...
Unlike regular variables, __________ can hold multiple values.
a. constants b. named constants c. arrays d. floats e. None of these
Which of the following describes morphing in Flash?
A. Creating a tween animation B. Altering an object's form as part of a shape tween C. Moving an object from one frame to another frame D. Using the ease out command to make an object appear faster
A Label object can be centered on the Windows Form object by using choices on the ____ menu.
A. File B. Edit C. Format D. Tools
Together, what are viruses, Trojans, and worms called?
A. Encrypted software B. Open source software C. Malware D. Spyware