Isaca CDPSE Question Answer
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?