Which of the following is the developer performing when testing the application?
A software development company has hired a programmer to develop a plug-in module to an
existing proprietary application. After completing the module, the developer needs to test the entire
application to ensure that the module did not introduce new vulnerabilities. Which of the following
is the developer performing when testing the application?
Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:
Methods to test the responses of software and web applications to unusual or unexpected inputs
are known as:
Which of the following application security testing techniques is implemented when an automated system generat
Which of the following application security testing techniques is implemented when an automated
system generates random input data?
Which of the following application security testing techniques is implemented when an automated system generat
Which of the following application security testing techniques is implemented when an automated
system generates random input data?
which are then used to perform boundary testing?
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
which are then used to perform boundary testing?
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
Which of the following describes purposefully injecting extra input during testing, possibly causing an applic
Which of the following describes purposefully injecting extra input during testing, possibly causing
an application to crash?
Which of the following describes purposefully injecting extra input during testing, possibly causing an applic
Which of the following describes purposefully injecting extra input during testing, possibly causing
an application to crash?
Which of the following should be implemented to accomplish this task?
A security administrator wants to test the reliability of an application which accepts user provided
parameters. The administrator is concerned with data integrity and availability. Which of the
following should be implemented to accomplish this task?
Which of the following should be implemented to accomplish this task?
A security administrator wants to test the reliability of an application which accepts user provided
parameters. The administrator is concerned with data integrity and availability. Which of the
following should be implemented to accomplish this task?