13.
Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called

15.
Programmers prefer programming to testing and sometimes they take shortcuts when writing tests. For example, they may write incomplete tests that do not check for all possible exceptions that may occur.

17.
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions?

18.
Choose the fault class in which the following automated static analysis check would fall:"Non-usage of the results of functions".