Your team is in the process of developing a new web application. As a security specialist, you are tasked with performing an assessment to identify potential security flaws. Which technique would allow you to analyze the behavior of the application during execution to identify unexpected outcomes, vulnerabilities or security violations?
Inspecting and interpreting web application firewall logs to identify potential security issues
Utilizing a configuration compliance scanner to ensure that the servers meet the company's baseline security standards
Conducting a run-time evaluation of the web application with a variety of inputs and analysing the response
Performing a detailed review of the source code of the web application before it is compiled