CompTIA Exam Questions

which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing

Explanation:
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data
to as inputs to a computer program. The program is then monitored for exceptions such as
crashes, or failed validation, or memory leaks.