Which of the following methodologies is BEST for a developer to find input validation weaknesses in their own mobile app source code?

Which of the following methodologies is BEST for a developer to find input validation weaknesses
in their own mobile app source code?

Which of the following methodologies is BEST for a developer to find input validation weaknesses
in their own mobile app source code?

A.
Disassembly of mobile app executable

B.
Threat modeling

C.
Fuzz testing an app’s attack surface

D.
Single stepping an app through a debugger

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *