choALYNnadiag
choALYNnadiag choALYNnadiag
  • 04-05-2016
  • Computers and Technology
contestada

Inherent flaws in system software code are called:
a. Logic Bomb
b. Vulnerability
c. Hazards
d. Heuristics

Respuesta :

taskmasters
taskmasters taskmasters
  • 17-05-2016
The answer is option (b.) Vulnerability

In a system software, the flaws in the code are called vulnerabilities. They are the weakness in the system and a risk. Attackers take the opportunity on this flaw to infiltrate the system's security.
Answer Link

Otras preguntas

4. You are asked to make 125 grams of a 7% antifungal cream using tolnaftate powder and Eucerin cream. How many grams of tolnaftate powder are needed? Round to
What is the converse of the following: "If I am hungry then l eat an apple." A. If I eat an apple then I am hungry. B. If I am hungry then I eat an apple. C. If
It is not possible for an airborne pathogen to travel very far. TRUE OR FALSE
The function f(x)=−5x^2+3 is defined over the domain −4
What is the output frequency for a counter circuit that contains 12 flip-flops with an input clock frequency of 20.48 MHz?
True or False: If p1, p2, . . . , pn are prime, then A = p1p2 . . . pn1 + 1 is also prime.
What is the final temperature of a drink if the initial 1.10 kg of water is at a temperature of 23.2 degC and 0.0700 kg of ice at 0 degC is placed in it?
find integers x and y such that 115x + 30y = gcd(431, 29)
Which values of a and b make the following equation true? (5x7y2)(-4x4y5)=-20xayb
What is this (pic provided) written as a single log?