Code reviews are effective countermeasures for all of the following threats EXCEPT:
a. Back doors
b. Maintenance hooks
c. Weak passwords
d. Buffer overflow
All of the following are functions of an operating system EXCEPT:
a. Database management
b. Process management
c. Resource management
d. Access management
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here