ISC2 CISSP Practice Question
Which software development security practice BEST supports forensic investigation after a security incident?
Comprehensive event logging with proper timestamps
Formal verification of algorithms
Code obfuscation
Regular penetration testing