Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
A. Utilize the change management process.
B. Validate functionality by running in a test environment.
C. Perform an in-depth code review with an expert.
D. Implement a service level agreement.
A. Utilize the change management process.
B. Validate functionality by running in a test environment.
C. Perform an in-depth code review with an expert.
D. Implement a service level agreement.