ISC2 CISSP Practice Question
Which of the following is the BEST approach for evaluating the security of third-party application components?
Conducting a software composition analysis and vulnerability scan
Using only open-source components with public code repositories
Reviewing the vendor's claims about security features during contract negotiations
Requesting the vendor's security certification documentation