Answer the following statements true (T) or false (F)

1. Many computer security vulnerabilities result from poor programming practices.
2. Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
3. Software security is closely related to software quality and reliability.
4. A difference between defensive programming and normal practices is that everything is assumed.
5. Programmers often make assumptions about the type of inputs a program will receive.


1. True
2. False
3. True
4. False
5. True

Computer Science & Information Technology

You might also like to view...

Which of the following does not have a stream associated with it?

a. cerr. b. cin. c. cout. d. All of the above have streams associated with them.

Computer Science & Information Technology

In Word, a green wavy underline denotes a potential ________ error

A) grammar B) file C) computer D) spelling

Computer Science & Information Technology

ECMA stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Reconnaissance, scanning, infiltration and escalation, exfiltration, access extension, assault, and obfuscation are considered ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology