Which of the following is an example of the use of defect taxonomies?

A.
Grouping defects found in execution by functional areas
B.
Following a defect management process through testing
C.
Running tests with the aim of finding as many defects as possible
D.
Using a list of known defect types to penetrate the security of computer systems
Explanation: