Which question reflects the security change management component of the change management process?
The product development team is preparing for the production deployment of recent feature enhancements. One morning, they noticed the amount of test data grew exponentially overnight. Most fields were filled with random characters, but some structured query language was discovered.
Which type of security development lifecycle (SDL) tool was likely being used?
Which type of security analysis is limited by the fact that a significant time investment of a highly skilled team member is required?
Which step in the change management process includes modifying the source code?