A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code.Which of the following assessment techniques is BEST described in the analyst's report?
A. Architecture evaluation
B. Baseline reporting
C. Whitebox testing
D. Peer review
Answer: D. Peer review
Computer Science & Information Technology
You might also like to view...
A ____ directs the computer to repeat one or more instructions until a certain condition is met.
A. selection control structure B. repetition control structure C. variable D. algorithm
Computer Science & Information Technology
Anomaly detection IDS can spot only behavior that is different from normal activity
Indicate whether the statement is true or false.
Computer Science & Information Technology
In MySQL Administrator, you can use the ____ section to monitor database performance.
A. Health B. Server Information C. Service Control D. Server Logs
Computer Science & Information Technology
Vshield can be used to secure vms from each other only when they are running on the same ESXi server
a. true b. false
Computer Science & Information Technology