Why is it important to know your enemies in an attack?

A. Who or what would like to attack your application and why
B. Who you need to avoid
C. Who should not know about the application
D. Who needs to stay our to the development room

Answer: A

Computer Science & Information Technology

You might also like to view...

If the person assisting you through Remote Access is not using Windows 8, you can send a(n) ________ to the person offering assistance

A) invitation file B) login and password C) remote access device D) encoded password

Computer Science & Information Technology

Macros are recorded in ________ language, which is used to write computer programs within the Microsoft Windows environment

A) Visual Basic for Activities B) Visual Basic for Associates C) Visual Basic for Applications D) Visual Basic for AJAX

Computer Science & Information Technology