Register
12:00
Stop
CISSP - Security and Privacy Controls - Software and System Security
Intermediate
1/12
A software development team is asked to provide a vulnerability assessment report for their application. Which of the following methods would provide the most accurate assessment?
a.
Using a vulnerability scanner only
b.
Performing a combination of automated and manual testing
c.
Relying on end-user feedback
d.
Reviewing code changes in the last month
Intermediate