Which of the following application security testing techniques is implemented when an automated system generates random input data?

A. Fuzzing
B. XSRF
C. Hardening
D. Input validation


Answer: A. Fuzzing

Computer Science & Information Technology

You might also like to view...

You can display ____________________ to reveal hidden symbols that indicate paragraph breaks, spaces, and tab stops.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What should you do to prevent blockage of the port used to communicate with a SQL Server instance?

A. disable the firewall on the client B. configure a fixed port C. disable the firewall on the server D. use named pipes

Computer Science & Information Technology

?Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Like the one in the accompanying figure, a(n) ____________________ website uses a diary or journal format, and is an informal site consisting of time-stamped articles.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology