CompTIA Exam Questions

Which of the following allows an attacker to identify vulnerabilities within a closed source softwar

Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

A.
Fuzzing

B.
Compiling

C.
Code reviews

D.
Vulnerability scanning