1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
1 year ago
7

A development team begins work on a new software application and decides to involve the client’s it experts to ensure that secur

ity concerns are addressed on an ongoing basis throughout the project’s lifecycle. Which security capability is responsible for securing the software?.
Computers and Technology
1 answer:
Katarina [22]1 year ago
7 0

Application Security is responsible for securing the software.

Application security refers to the process of creating, integrating, and testing security measures inside of applications to close security vulnerabilities to threats including unauthorised access and modification.

Application security is a technique for making apps more secure by identifying, addressing, and enhancing the security of apps.

While much of this occurs during the development phase, it also includes tools and approaches to protect apps after they are launched.

A method for identifying a device's vulnerabilities and confirming that its sources and data are protected from potential intruders is security testing.

It ensures that the application and software are safe from any dangers or hazards that could cause a loss.

Learn more about application security:

brainly.com/question/28020583

#SPJ4

The complete question is ''A Development team begins work on a new software application and decides to

involve the client's IT experts to ensure that security concerns are addressed on

an ongoing basis throughout the project's lifecycle.

Which security capability is responsible for securing the software?

O Application Security

O Identity and Access Management

O Security Operations

O Risk Management

O I don't know this yet.

You might be interested in
___ is a career discipline focusing on helping companies use computer technology effectively.
pickupchik [31]

Answer:

A (information technology)

Explanation:

4 0
2 years ago
Are tigers and goldfish related
Cerrena [4.2K]
Yes, they are by law of America
7 0
2 years ago
I wiil mark brainlist ​
Darina [25.2K]
CAD is the answer you require, but it may also be Spread sheet

Hope this helped ♥︎
5 0
3 years ago
Plato :
ddd [48]

Answer:

filler content

Explanation:

Isabel must use some sort of filler content while creating a wireframe that she is up with. For the banner, she can make use of the placeholder, and for the text, she can make use of the lorem ipsum. Also, if the wireframe is low fidelity then only she can use above. And if the wireframe is high fidelity then she should use the original banner and text.

3 0
3 years ago
Read 2 more answers
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Rina8888 [55]

Answer:

a. Checksum

Explanation:

Based on the information provided within the question it can be said that the field that represents this information is called the Checksum. Like mentioned in the question this refers to a value that represents the amount of bits in a certain transmission message. This is done in order to make sure that the amount of bits that were sent match the amount that were received in order to make sure that no data was lost in transit that would cause high-level errors.

7 0
2 years ago
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • Belvedere Street is parallel to St. Anthony Street. Davidson Street is perpendicular to River Street. River Street is parallel t
    11·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • The natural language convention used to represent ip addresses is called the:
    15·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • Please help ASAP!
    5·1 answer
  • What are benefits of virtualizing servers ?
    5·1 answer
  • Which is NOT one of the basic characteristics of life? What feature of Microsoft
    5·1 answer
  • How can i setup a mesage room and also want to hangout ??????
    10·1 answer
  • The Linux tail command prints the last maximum n lines of a file. When writing a function that performs this function, choose th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!