CompTIA Exam Questions

which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform boundary
testing?

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing

Explanation:
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs
to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or
memory leaks.