A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code.Which of the following assessment techniques is BEST described in the analyst's report?

A. Architecture evaluation
B. Baseline reporting
C. Whitebox testing
D. Peer review


Answer: D. Peer review

Computer Science & Information Technology

You might also like to view...

A ____ directs the computer to repeat one or more instructions until a certain condition is met.

A. selection control structure B. repetition control structure C. variable D. algorithm

Computer Science & Information Technology

Anomaly detection IDS can spot only behavior that is different from normal activity

Indicate whether the statement is true or false.

Computer Science & Information Technology

In MySQL Administrator, you can use the ____ section to monitor database performance.

A. Health B. Server Information C. Service Control D. Server Logs

Computer Science & Information Technology

Vshield can be used to secure vms from each other only when they are running on the same ESXi server

a. true b. false

Computer Science & Information Technology