What type of processes identify and eliminate exploitable defects?

A. Management
B. Security
C. Assurance
D. Documentation


Answer: C

Computer Science & Information Technology

You might also like to view...

Whenever you look up a class in the Java API, the top-left corner of that class's page traces that class's superclasses all the way back to ____.

A. Object B. Class C. System D. Runnable

Computer Science & Information Technology

Wyatt is thinking about purchasing his first computer. He wants to make sure that he buys a computer that fits his lifestyle. Wyatt decides that it is a good idea to password protect his computer. His user name is TMWyatt. He decides that the most secure password he can use is ____.

A. TMWyatt B. his birthday C. T7Wya8tt D. his dog's name

Computer Science & Information Technology

Which of the following is a new feature of PowerPoint 2013?

A) Animation effects are color-coded B) The mouse over feature for ScreenTips C) Using text as a trigger D) ScreenTips added to hyperlinks

Computer Science & Information Technology

The ____ event is triggered when the Web browser unloaded a page from memory.

A. onMemory B. onUnload C. onPage D. onHistory

Computer Science & Information Technology