Sara, the software security engineer, is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help Sara automate this detection?

A. Input validation
B. Exception handling
C. Fuzzing
D. Code review


Answer: C. Fuzzing

Computer Science & Information Technology

You might also like to view...

To change the time or date, left-click the displayed time and select Adjust Date/Time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Create a sequence diagram that models the on-site service request mentioned in Task 1.

What will be an ideal response?

Computer Science & Information Technology

The items circled in the accompanying figure are the frames that have been selected for ____.

A. cataloguing B. content previewing C. onion skinning D. concatenation

Computer Science & Information Technology

To enable tracked changes, press ____ on the keyboard.

A. CTRL+SHIFT+E B. CTRL+ E C. CTRL+ T D. CTRL+SHIFT+T

Computer Science & Information Technology