A. Controls that are intended to ensure that attacks are unsuccessful
B. Controls that are intended to detect and repel attacks
C. Controls that are intended to support recovery from problems
D. All of the mentioned
A. Risk assessment before the system has been deployed
B. Risk assessment while the system is being developed
C. All of the mentioned
D. None of the mentioned
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
A. Attack
B. Threat
C. Vulnerability
D. Control
A. True
B. False
ExpLanation: it is a security attack.
A. Storage management faults
B. Data faults
C. Input/output faults
D. Interface faults
A. True
B. False
ExpLanation: the static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs
A. Control faults
B. Data faults
C. Input/output faults
D. Interface faults
A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned
A. Storage management faults
B. Data faults
C. Input/output faults
D. Interface faults