Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications.Which of the following best describes what she will do?

A. Enter random or invalid data into the application in an attempt to cause it to fault
B. Work with the developers to eliminate horizontal privilege escalation opportunities
C. Test the applications for the existence of built-in- back doors left by the developers
D. Hash the application to verify it won't cause a false positive on the HIPS


Answer: A. Enter random or invalid data into the application in an attempt to cause it to fault

Computer Science & Information Technology

You might also like to view...

____ risk and the consequent losses is probably the most common approach to risk handling, because many risks pass through the risk management function unidentified, or unacknowledged.

A. Accepting B. Mitigating C. Preventing D. Avoiding

Computer Science & Information Technology

A(n) ____________________ is another way to refer to an object reference variable.

a) referer b) pointer c) stack collection d) primitive variable e) instantiated object

Computer Science & Information Technology

The ________ identifies the data series

A) row titles B) vertical axis C) horizontal axis D) legend

Computer Science & Information Technology

________ fields can store up to 1 gigabyte of characters, of which you can display 65,535 characters in a control on a form or report

Fill in the blank(s) with correct word

Computer Science & Information Technology