There is reason to believe that a recently modified web application has allowed unauthorized access. Which is the BEST way to identify an application backdoor?
A. Black box pen test
B. Security audit
C. Source code review
D. Vulnerability scan
A. Black box pen test
B. Security audit
C. Source code review
D. Vulnerability scan