Which of the following application security testing techniques is implemented when an automated system generates random input data?
A. Fuzzing
B. XSRF
C. Hardening
D. Input validation
Answer: A. Fuzzing
You might also like to view...
You can display ____________________ to reveal hidden symbols that indicate paragraph breaks, spaces, and tab stops.
Fill in the blank(s) with the appropriate word(s).
What should you do to prevent blockage of the port used to communicate with a SQL Server instance?
A. disable the firewall on the client B. configure a fixed port C. disable the firewall on the server D. use named pipes
?Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer.
Answer the following statement true (T) or false (F)
Like the one in the accompanying figure, a(n) ____________________ website uses a diary or journal format, and is an informal site consisting of time-stamped articles.
Fill in the blank(s) with the appropriate word(s).