Which of the following security concepts identifies input variables which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform boundary testing?

A. Secure coding
B. Application hardening
C. Fuzzing
D. Application baseline

Answer
C. Fuzzing