PrepAway - Latest Free Exam Questions & Answers

which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform boundary
testing?

PrepAway - Latest Free Exam Questions & Answers

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing

Explanation:
Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs
to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or
memory leaks.

PrepAway - Latest Free Exam Questions & Answers

Leave a Reply