A distributed system must defend itself against__________________?
		A. Modification
B. Interruption
C. Fabrication
D. All of the mentioned
		A. Modification
B. Interruption
C. Fabrication
D. All of the mentioned
		A. Session Management
B. Security
C. User interaction
D. Database support
		A. aspect
B. join point
C. join point model
D. pointcut
		A. Policy implementation
B. QoS
C. Security
D. Verify invoice
Explanation: It is a part of Business service layer.
		A. CMM
B. ISO-9001
C. CASE tools
D. Formal methods
Explanation: Formal methods provide a concise, unambiguous, and consistent method for documenting system requirements.
		A. Contradictions
B. Ambiguities
C. Vagueness
D. Incompleteness
Explanation: Achieving a high level of precision consistently is an almost impossible task.
		A. Activating & Deactivating Objects
B. Security features
C. Files implementing the entities identified within the ERD
D. Registering object implementation