Match each item with a statement below.

A. A method for obtaining information about the way variables are used and defined in a program.
B. Can identify common symbols that the initiating programming language defines.
C. A great way to find SQL injection vulnerabilities.
D. A simple detection tool that searches for, and locates, user-defined strings and patterns found within source code.
E. A set of rules that defines the method by which hypertext requests and responses (Web requests and responses) are formatted and packaged.
F. An effort to find problems in the source code of a program while the program is inactive.
G. Defines a set of rules that ensures a reliable virtual connection for delivery of data from one machine to another.
H. Retrieves the information and dynamically builds the SQL statement to be forwarded to the application server or middleware.
I. Enables the interceptions and modification of HTTP requests, including GET and POST parameters.


A. data flow analysis
B. lexical analyzer
C. inferential testing
D. string-based matching
E. HTTP
F. static analysis
G. TCP
H. scripting language
I. proxy server

Computer Science & Information Technology

You might also like to view...

Good management skills are as crucial to good Web design as a well-chosen color or typeface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________________ command reviews the current connections and reports which ports a server is listening to.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ is the process of acquiring the traits of one's predecessors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can change the outline shape of an image either with or without a border

Indicate whether the statement is true or false

Computer Science & Information Technology