Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
A . Utilize the change management process.
B . Validate functionality by running in a test environment.
C . Perform an in-depth code review with an expert.
D . Implement a service level agreement.
Answer: C