Which of the following techniques floods an application with data in an attempt to find vulnerabilities?

A. Header manipulation
B. Steganography
C. Input validation
D. Fuzzing


Answer: D. Fuzzing

Computer Science & Information Technology

You might also like to view...

i. Name three general strategies to reduce the size of a digital media file.

ii. Which of these strategies does not necessarily sacrifice the quality of the media file? Why?

Computer Science & Information Technology

________ is a group of capabilities offered via cloud computing in which the cloud service customer can deploy, manage, and run customer-created or customer-acquired applications using one or more programming languages and one or more supported execution environments by the cloud service provider.

A) NaaS B) PaaS C) SaaS D) CaaS

Computer Science & Information Technology

The ________ input type allows visitors to select one option only from a predefined set of options

A) radio button B) option box C) drop-down list D) text list

Computer Science & Information Technology

Select the Header row option if you want to include column headings in the sorted table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology