-
Good firewall secures a software from all security threats?
True or False?
-
Non financial are less prone to attack
Yes or No?
-
Buffer over flow is a software weakness categorized under?
1.operational issues 2.design flaw 3.requirement oversight 4.implementation bug
-
Trusting external connection is a software weakness categorized under ?
1.operational issues 2.design flaw 3.requirement oversight 4.implementation bug