1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
2 years ago
7

A development team begins work on a new software application and decides to involve the client’s it experts to ensure that secur

ity concerns are addressed on an ongoing basis throughout the project’s lifecycle. Which security capability is responsible for securing the software?.
Computers and Technology
1 answer:
Katarina [22]2 years ago
7 0

Application Security is responsible for securing the software.

Application security refers to the process of creating, integrating, and testing security measures inside of applications to close security vulnerabilities to threats including unauthorised access and modification.

Application security is a technique for making apps more secure by identifying, addressing, and enhancing the security of apps.

While much of this occurs during the development phase, it also includes tools and approaches to protect apps after they are launched.

A method for identifying a device's vulnerabilities and confirming that its sources and data are protected from potential intruders is security testing.

It ensures that the application and software are safe from any dangers or hazards that could cause a loss.

Learn more about application security:

brainly.com/question/28020583

#SPJ4

The complete question is ''A Development team begins work on a new software application and decides to

involve the client's IT experts to ensure that security concerns are addressed on

an ongoing basis throughout the project's lifecycle.

Which security capability is responsible for securing the software?

O Application Security

O Identity and Access Management

O Security Operations

O Risk Management

O I don't know this yet.

You might be interested in
Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
madreJ [45]

Answer:

D. The image will require fewer bits in order to be represented.

Explanation:

Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

5 0
3 years ago
A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are sa
stiv31 [10]

Answer:

This code is written in MATLAB.

function [result] = isPalindrome(array,length)

if length == 0 || length == 1 %if the array is empty or contains only one element, the array is a palindrome

result = 1;

else

for i = 1:length/2 %check all the elements forward and backward until the middle is reached

if array(i) ~= array(end+1-i)

result = 0;

return

end

end

result = 1;

end

Explanation: Please read the comments in the code. In MATLAB, Boolean values are 1 or 0 instead of True or False.

6 0
3 years ago
A photograph with more yellows has which mood
just olya [345]

Answer:

Yellow reflects most of the light and thus draws lots of attention; too bright a shade will leave you irritated. Prolonged exposure can also have a tiring effect. It is best used in down-tones; as background for white articles/figures. Green is the color of tranquility and vibrant.

Explanation:

6 0
3 years ago
Read 2 more answers
What refers to a metal combined with one or more other elements
alexira [117]
The correct answer is an Alloy.
8 0
3 years ago
Which of these can be considered data?<br> A:facts<br> B:information<br> C:belief<br> D:all of these
IceJOKER [234]

A) facts.

Facts is the only thing that can be considered REAL data.

6 0
3 years ago
Other questions:
  • Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for e
    13·1 answer
  • Discuss OPENGL instruction to draw the following drawing primatives:
    14·1 answer
  • Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
    5·1 answer
  • Banking, insurance, telecommunications, and education are examples of the type of knowledge industry that A. has information as
    12·2 answers
  • During executing of the ______ PR task, units regain control of IP and transfer physical custody to the reintegration team.
    6·1 answer
  • my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
    7·1 answer
  • And tags are examples of stand - alone tags.
    15·1 answer
  • You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your netw
    13·1 answer
  • Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your
    8·1 answer
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!