An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
A. False negative
B. True negative
C. False positive
D. True positive
Answer: C. False positive
Computer Science & Information Technology
You might also like to view...
In the UML, the top compartment of the rectangle modeling a class contains:
a. The class’s name. b. The class’s attributes. c. The class’s behaviors. d. All of the above.
Computer Science & Information Technology
Assuming that text is a variable of type string, what will be the contents of text after the statement cin >> text; is executed if the user types Hello World! then presses Enter?
a. "H" b. "Hello" c. "Hello World" d. "Hello World!"
Computer Science & Information Technology