A new web application has suffered several overflow attacks in the first week of its implementation. What type of testing could have identified these bugs in the code?

A. fuzzing
B. ping scan
C load testing
D. latency test


A
Explanation: Fuzz testing submits invalid, unexpected, or random data to the inputs of a computer program. By doing so, insecure reactions by the program can be detected.

Computer Science & Information Technology

You might also like to view...

Which of the following writing style requires more words may make your presentation seem flat?

A) Passive voice B) Active voice C) Parallel construction D) Beginning bullets with a verb

Computer Science & Information Technology

When you are sorting in descending order, use the greater than operator (>) in the comparison to swap adjacent elements if the first element is greater than the second.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

A. restored file B. bot C. IP file D. backup

Computer Science & Information Technology

As shown in the accompanying figure, the gray work area and the panels are referred to collectively as the ____.

A. workspace B. matrix C. view D. docking station

Computer Science & Information Technology