Which security testing approach is used to review source code and binaries without executing the application?

A. Regression testing
B. Dynamic application security testing
C. Static application security testing
D. Fuzz testing


Answer: C. Static application security testing

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 6-1James is setting up user accounts on his new computer. He would like to create several accounts with different privileges. Answer the questions James asks himself. James wants to set up another account that can be used by his friends when they are coming to his house and would like to check their e-mails or view the latest sport news. What type of user account should he set up?

A. non-standard user B. on-line user C. Guest D. Visitor

Computer Science & Information Technology

Which of the following are the two basic modes in which IPsec can operate?

A. Encrypted and encapsulated B. Open and secure C. Transport and tunnel D. Authenticated and clear text

Computer Science & Information Technology

What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

A. A typical NAS has better performance than a SAN. B. A SAN lacks the more advanced features of a NAS. C. A SAN is more costly to implement. D. A SAN cannot make use of the iSCSI protocol.

Computer Science & Information Technology

Please describe the following Intelligent Agents and the functions they serve: Application assistants, Shopping bots, Entertainment bots, and Chatterbots.

What will be an ideal response?

Computer Science & Information Technology