To identify defects in process flows related to typical use of the system.
B. To identify defects in the connections between components.
C. To identify defects in the system related to extreme scenarios.
D. To identify defects in the system related to the use of unapproved programming practices