which are then used to perform boundary testing? seenagape 10 years ago Which of the following security concepts identifies input variables which are then used to performboundary testing? A.Application baseline B.Application hardening C.Secure coding D.Fuzzing ← Previous question Next question →