Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Defect density alone can be used to judge the security of code accurately.
Home
Data Handling
Defect density alone can be used to judge the security of code accurately.
0
votes
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
edited
Mar 16, 2021
by
rajeshsharma
Defect density alone can be used to judge the security of code accurately.
i) True
ii) False
#defect-density
secure-code-review
DataHandling-questions-answers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is ii) False
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
Q: The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
0
votes
Q: The average occurrance of programming faults per Lines of Code (LOC) is known as _______.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#defect-density
code-review
secue-code-review
0
votes
Q: Inviting a friend to help look for a hard-to-find vulnerability is a method of security code review.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-vulnearability
DataHandling-questions-answers
0
votes
Q: The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#source-code-review
DataHandling-questions-answers
0
votes
Q: A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-security
secure-code-review
0
votes
Q: __________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-size
secure-code-review
code-review
size-code
0
votes
Q: Which of the following can be used to prevent end users from entering malicious scripts?
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#data-validation
DataHandling-questions-answers
...