A company which manufactures ASICs for use in an IDS wants to ensure that the ASICs’ code is not prone to buffer and integer overflows. The ASIC technology is copyrighted and the confidentiality of the ASIC code design is exceptionally important. The company is required to conduct internal vulnerability testing as well as testing by a third party.
Which of the following should be implemented in the SDLC to achieve these requirements?
A . Regression testing by the manufacturer and integration testing by the third party
B . User acceptance testing by the manufacturer and black box testing by the third party
C . Defect testing by the manufacturer and user acceptance testing by the third party
D . White box unit testing by the manufacturer and black box testing by the third party
Answer: D
Leave a Reply