_________ is a tool used to automatically identify potentially vulnerable programs.
A. Slamming B. Sledding
C. Fuzzing D. All the above
C. Fuzzing
You might also like to view...
A vector graphicis a graphic that is made up of pixels, which are straight or curved line segments connected by anchor points.
Answer the following statement true (T) or false (F)
All of the following statements are TRUE about data validation EXCEPT:
A) Each of the validation criteria can be specified with an input message and/or an Error Alert. B) Data validation restricts a single validation criteria per cell. C) Custom validation can be used to apply multiple validation criteria to a cell. D) An Error Message appears when a user makes a validated cell active and prompts a user before data is entered with information about data constraints.
The W3C formally recommends using the ____ DOM.
A. CSS B. DHTML C. XML D. HTML
Which of the following is not a symmetric encryption algorithm?
a. DES b. RSA c. Blowfish d. AES