A company used a partner company to develop critical components of an application. Several employees of the partner company have been arrested for cybercrime activities. Which of the following should be done to protect the interest of the company?
A. Perform a penetration test against the application
B. Conduct a source code review of the application
C. Perform a baseline review of the application
D. Scan the application with antivirus and anti-spyware products.
Answer: A. Perform a penetration test against the application
You might also like to view...
Answer the following statements true (T) or false (F)
1. An individual array element can be processed like any other type of C++ variable. 2. In C++11 you cannot use a range-based for loop to modify the contents of an array unless you declare the range variable as a reference variable. 3. In C++11 the range-based for loop is best used in situations where you need the element subscript for some purpose. 4. Although two-dimensional arrays are a novel idea, there is no known way to pass one to a function. 5. Each individual element of an array can be accessed by the array name and the element subscript.
List the three broad, horizontal levels of management in organizations.
What will be an ideal response?
Software packages created with the RPM utility are often called "RPM files" or simply "____."
A. packages B. archives C. installations D. repositories
To lock only one layer, you click the lock icon on the Timeline.
Answer the following statement true (T) or false (F)