True/False
8. TLS is dead and SSL is the path forward.
9. A signed applet can be hijacked.
10. The spiral model is an iterative model designed to enablethe construction of increasingly complex versions of a project.
11. The generation of a real random number is a trivialtask.
12. Buffer overflow is one of the most common web attackmethodologies.
13. Compilers create runtime code that can be executed via aninterpreter engine, like a Java virtual machine (JVM), on acomputer system.
Solution
Solution 8: False
Solution 9: True
Signed Active X control can be hijacked.They can be referencedby websites.
Solution 10 :True
Spiral model is the combination of iterative model and
OR
OR