Answer the following statements true (T) or false (F)
1. Many computer security vulnerabilities result from poor programming practices.
2. Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
3. Software security is closely related to software quality and reliability.
4. A difference between defensive programming and normal practices is that everything is assumed.
5. Programmers often make assumptions about the type of inputs a program will receive.
1. True
2. False
3. True
4. False
5. True
You might also like to view...
Which of the following does not have a stream associated with it?
a. cerr. b. cin. c. cout. d. All of the above have streams associated with them.
In Word, a green wavy underline denotes a potential ________ error
A) grammar B) file C) computer D) spelling
ECMA stands for ________
Fill in the blank(s) with correct word
Reconnaissance, scanning, infiltration and escalation, exfiltration, access extension, assault, and obfuscation are considered ________.
Fill in the blank(s) with the appropriate word(s).