1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
12

The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at

tacks, authentication attacks, authorization attacks, and cryptographic attacks, and how we might mitigate these by following secure coding guidelines. Besides protecting O S software on hosts, there is a need to protect applications that run on these devices. Aspects of application security includes all except:____.
A. Application development security.
B. Secure coding techniques.
C. Code testing.
D. Requirement Assessment.
Computers and Technology
1 answer:
spayn [35]3 years ago
8 0

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

You might be interested in
Look at the following structure declaration.
myrzilka [38]

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

7 0
3 years ago
4.5 Code Practice
Alex787 [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This program is written in C++.

                                                                         

#include <iostream>

using namespace std;

int main()

{

   

   string word;// variable for taking user input

   int cond;// to set condition true if user preses the stop and exit from loop

   

   cout<<"Enter word: \n";

   cin>>word;

   do// start while loop

   {

       

       

       if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit

       {

       cond=0;

       

       }

       else//otherwise loop continue

       {

           cout<<" You Entered "+ word +"\n";

           cout<<"Enter word: \n";

           cin>>word;

           cond=1;

       }

   }  

   while(cond == 1);// if user don't enter word "stop" loop run continuesly.  

   cout<<"Program exit";

   

   return 0;

}

5 0
3 years ago
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
Sergeeva-Olga [200]

Answer:

a, c, d

Explanation:

6 0
3 years ago
Read 2 more answers
How do you create a table in an existing database on Microsoft Access?
earnstyle [38]
Hello! In order to make a table in an existing database, first, you need to open the database you want to open, and then on the create tab, go on the tables group and click table. A table will be inserted into the database and you will be able to see it in datasheet view. That will help you make the table and be able to edit as needed.

8 0
4 years ago
Read 2 more answers
Which of the following best describes the primary function of software applications?
e-lub [12.9K]
The answer is that it is to perform specific operations for various applications. These functions include writing reports, creating spreadsheets, manipulating images, keeping records and developing websites and calculating expenses.
7 0
3 years ago
Read 2 more answers
Other questions:
  • At an uncontrolled intersection, you should yield to the car on the right. True or false.
    10·2 answers
  • Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in
    5·1 answer
  • .The __________ comes in handy when I'm using Microsoft Word to type an essay with a specific word number requirement
    6·1 answer
  • Which of the following is NOT a fall prevention system?
    12·2 answers
  • What does good time management mean​
    8·2 answers
  • Select the correct answer.
    9·1 answer
  • How many times is the body of the loop executed?
    8·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
  • Ways to ask for help effectively include
    8·1 answer
  • 2. How can Tailwind Traders ensure applications use geo-redundancy to create highly available storage applications?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!