which are then used to perform boundary testing? seenagape 9 years ago Which of the following security concepts identifies input variables which are then used to performboundary testing? A.Application baseline B.Application hardening C.Secure coding D.Fuzzing ← Previous question Next question →