CompTIA Exam Questions

Which of the following should be used to identify overflow vulnerabilities?

Which of the following should be used to identify overflow vulnerabilities?

A.
Fuzzing

B.
Input validation

C.
Privilege escalation

D.
Secure coding standards