Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

A.
Application baseline
B.
Application hardening
C.
Secure coding
D.
Fuzzing
Explanation:
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data
to as inputs to a computer program. The program is then monitored for exceptions such as
crashes, or failed validation, or memory leaks.