Which tool should an application developer use to help identify input validation vulnerabilities?

A. scanner
B. filter
C. fuzzer
D. sniffer


Answer: C. fuzzer

Computer Science & Information Technology

You might also like to view...

When modifying a theme, the color ________ displays a set of colors for every theme

A) dialog box B) pane C) palette D) gallery

Computer Science & Information Technology

Which switch can be used with the route command to clear any gateway entries?

A) -d B) -c C) -f D) -n

Computer Science & Information Technology

Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can create atomic values based on XML Schema data types using the _____ function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology