A(n) ________ is a program that takes advantage of a(n)__________
A. exploit, vulnerability
B. vulnerability, exploit
C. vulnerability, risk
D. risk, exploit
A. exploit, vulnerability
You might also like to view...
________ Top Row keeps only the top row visible as you scroll through a worksheet
Fill in the blank(s) with correct word
A consultant is looking to consolidate six company servers into one physical system. Which of the following requirements is most important on the new setup to ensure stable functionality of the virtual environment?
a. network resources b. server software security requirements c. server hardware resources d. client hardware requirements
Which of the following statements is false?
a. You can reuse a class many times to build many objects. b. The overhead of reusing classes instead of building new ones can discourage re-use. c. Reuse also helps you build more reliable and effective systems, because existing classes and components often have gone through extensive testing, debugging and performance tuning. d. Just as the notion of interchangeable parts was crucial to the Industrial Revolution, reusable classes are crucial to the software revolution that has been spurred by object technology.
Which of the following statements is false?
a) An exception indicates a problem that occurs while a program executes. b) Exception handling helps you create fault-tolerant programs. c) When an exception is handled, the program continues executing as if no problem was encountered. d) The compiler does not detect exceptions.