The design review for an application has been completed and is ready for release. What technique should an organization use to assure application integrity?
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption