Which of the following security concepts identifies input variables which are then used to perform boundary testing?
A. Secure coding
B. Application hardening
C. Fuzzing
D. Application baseline
Answer
C. Fuzzing
A. Secure coding
B. Application hardening
C. Fuzzing
D. Application baseline
Answer
C. Fuzzing