CompTIA Exam Questions

which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing

Explanation: