Practice Test Geeks home

ISSAP - Information Systems Security Architecture Professional Application and System Security Questions and Answers

A security architect wants to implement a testing methodology that can identify insecure coding practices, such as potential SQL injection or buffer overflow vulnerabilities, by analyzing the application's source code without executing it.
Which testing methodology should be chosen?

Select your answer