Ann, a security administrator, has been instructed to perform fuzz-based testing on the company’s applications.
Which of the following best describes what she will do?
Enter random or invalid data into the application in an attempt to cause it to fault
Work with the developers to eliminate horizontal privilege escalation opportunities
Test the applications for the existence of built-in- back doors left by the developers
Hash the application to verify it won’t cause a false positive on the HIPS.