Multiple Choice
Which software artifact depicts how the application could incur abuses from the user?
A) Use case
B) Misuse case
C) Conceptual model
D) Software design
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: A design flaw in the application that
Q3: What is the best defense against attacks
Q4: Social engineering is a complicated attack to
Q5: W3C sets standards for Web browsers, JavaScript,
Q6: Which of the following standards require participants
Q8: Mobile devices are critical to an application's
Q9: A use case describes the security of
Q10: Stealing hardware, cutting system cable, or taking
Q11: Software requirements document how the system is
Q12: Record retention includes printing confidential information to