An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?

A. False negative
B. True negative
C. False positive
D. True positive

Answer: C. False positive

Computer Science & Information Technology

You might also like to view...

In the UML, the top compartment of the rectangle modeling a class contains:

a. The class’s name. b. The class’s attributes. c. The class’s behaviors. d. All of the above.

Computer Science & Information Technology

Assuming that text is a variable of type string, what will be the contents of text after the statement cin >> text; is executed if the user types Hello World! then presses Enter?

a. "H" b. "Hello" c. "Hello World" d. "Hello World!"

Computer Science & Information Technology