Your organization produces a proprietary piece of hardware of which confidentiality of the software code is critical. Considering this what type of vulnerability testing should a third-party vulnerability team be allowed to perform?
A. white box
B. black box
C. regression
D. integration
B
Explanation: Black-box testing is testing in which no information about the inner workings of the source code is shared with the tester. In this case that type of testing would maintain the confidentiality of the software code.
You might also like to view...
This is a digital mobile telephone system that is used in Europe and other parts of the world.
What will be an ideal response?
________ is the study of workers and their relationships with things such as chair placement, desk design, and lighting
Fill in the blank(s) with correct word
When a ________ indent is applied, the first line of a paragraph is indented by 0.5"
Fill in the blank(s) with correct word
When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?
A. mtr B. traceroute C. tracert D. tracepath