in Data Handling by
Q:
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as ______________.

Black Box Testing

Penetration Testing

Secure Code Review

Vulnerability Testing
Learn More with Madanswer

Related questions

+2 votes
asked Jan 15, 2020 in Agile by Robindeniel
...