An IT security technician is actively involved in identifying coding issues for her company. Which of
the following is an application security technique that can be used to identify unknown
weaknesses within the code?

A.
Vulnerability scanning
B.
Denial of service
C.
Fuzzing
D.
Port scanning