Which of the following would protect against an attacker entering malicious code into a web form?
A. White-box testing
B. Fuzzing
C. Black-box testing
D. Input validation
D. Input validation is the process that ensures the correct usage of data within web forms and other portions of websites where users can enter data.
You might also like to view...
As programs get bigger, they get more confusing if they're not structured.
Answer the following statement true (T) or false (F)
Why it important for software processes to be agile?
What will be an ideal response?
An add-inĀ is a custom program or additional command that you can use to extend the functionality of a Microsoft Office program.
Answer the following statement true (T) or false (F)
Low contrast between colors is an ideal condition for making selections based on color.
Answer the following statement true (T) or false (F)