Register
5:00
Stop
CISSP - Security and Risk Management - Security Assessment and Testing
Advanced
1/5
Which of the following techniques is most effective for identifying vulnerabilities in web applications during a security assessment?
a.
Dynamic Application Security Testing (DAST)
b.
Automated vulnerability scanning of network infrastructure
c.
Static Application Security Testing (SAST)
d.
Manual code review by experienced developers
Advanced