Which of the following assessments would Pete, the security administrator, use to actively test that an application's security controls are in place?

A. Code review
B. Penetration test
C. Protocol analyzer
D. Vulnerability scan


Ans: B. Penetration test

Computer Science & Information Technology

You might also like to view...

A(n) ____ is a class method, a Sub procedure named New, that contains the instructions for initializing the class's Private variables.

A. default constructor B. maker C. default creator D. instantiate

Computer Science & Information Technology

To find a synonym for a phrase, select the phrase, then right-click it to display the shortcut menu. Point to Synonyms, then click Thesaurus to open the _____ pane.

A. Research B. Synonyms C. Review D. Thesaurus

Computer Science & Information Technology

Criticisms of the government, particularly if not true, are known as ____ speech and have often been the grounds for prosecution.

A. treasonous B. blasphemous C. seditious D. dangerous

Computer Science & Information Technology

The ________ function category performs tests and returns the value of the tests

Fill in the blank(s) with correct word

Computer Science & Information Technology