Which of the following security concepts identifies input variables which are then used to perform boundary
testing?

A.
Application baseline
B.
Application hardening
C.
Secure coding
D.
Fuzzing
Explanation:
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs
to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or
memory leaks.