Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification,
and whether the manipulation of data values in variables is valid and meaningful.
Indicate whether the statement is true or false.
Question 2
There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program.
Indicate whether the statement is true or false.