A. True
B. False
Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs
Advertisement
Related Mcqs:
- Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
- A. Storage management faults B. Data Faults C. Input/Output Faults D. Interface faults...
- Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
- A. Control Faults B. Data Faults C. Input/Output Faults D. Interface faults...
- Which level of Static Analysis allows specific rules that apply to a program to be checked ?
- A. Characteristic error checking B. User-defined error checking C. Assertion checking D. All of the mentioned...
- Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
- A. Storage management faults B. Data Faults C. Input/Output Faults D. Interface faults...
- Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?
- A. Control Faults B. Data Faults C. Input/Output Faults D. Interface faults...
- Which of the following is a technique covered in Static Analysis ?
- A. Formal verification B. Model checking C. Automated program analysis D. All of the mentioned...
- Static Analysis involves executing a program ?
- A. True B. False...
- A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?
- A. risk B. control C. attack D. asset...
- Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?
- A. True B. False...
- At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?
- A. Preliminary risk analysis B. Life-cycle risk analysis C. Operational risk analysis D. All of the mentioned...
Advertisement