An application developer has tested some of the known exploits within a new application. Which of
the following should the administrator utilize to test for unidentified faults or memory leaks?
A.
XSRF Attacks
B.
Fuzzing
C.
Input Validations
D.
SQL Injections