Which of the following assessment techniques would a security administrator implement to ensure
that systems and software are developed properly?

A.
Baseline reporting
B.
Input validation
C.
Determine attack surface
D.
Design reviews
Explanation: