Q: 17
A Chief Information Security Officer wants to implement security by design, starting ……
vulnerabilities, including SQL injection, FRI, XSS, etc. Which of the following would most likely meet
the requirement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.