A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Explanation: All the options are good practices to achieve Dependability Engineering.
- Dependability and Security
- Dependability and Security
IF YOU THINK THAT ABOVE POSTED MCQ IS WRONG.
PLEASE COMMENT BELOW WITH CORRECT ANSWER AND ITS DETAIL EXPLANATION.