A company used a partner company to develop critical components of an application. Several employees of the
partner company have been arrested for cybercrime activities. Which of the following should be done to protect
the interest of the company?
Perform a penetration test against the application
Conduct a source code review of the application
Perform a baseline review of the application
Scan the application with antivirus and anti-spyware products.