WGU Related Exams
Secure-Software-Design Exam

Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?
Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?