Which of the following assessment techniques would a security administrator implement to ensure that systems
and software are developed properly?
Determine attack surface
When implementing systems and software, an important step is the design of the systems and software. The
systems and software should be designed to ensure that the system works as intended and is secure.
The design review assessment examines the ports and protocols used, the rules, segmentation, and access
control in the system or application. A design review is basically a check to ensure that the design of the system
meets the security requirements.