A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle.Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?
A. Architecture review
B. Risk assessment
C. Protocol analysis
D. Code review
Answer: D. Code review
Computer Science & Information Technology
You might also like to view...
The for each loop is designed to work with a temporary, read-only variable known as the ____________.
a. loop variable b. counter variable c. iteration variable d. for each variable
Computer Science & Information Technology
If you select a state and change the image by accident, you can use the ____ command on the Edit menu to restore the eliminated states.
a. Undo b. Redo c. Fix d. Restore
Computer Science & Information Technology
An inductive organization of interview questions can be visualized as having a ________ shape.
A) pyramid B) diamond C) funnel D) cube
Computer Science & Information Technology
Why is an ID attribute needed when referencing some variables and not others?
What will be an ideal response?
Computer Science & Information Technology