A company is developing a new web application for its Internet users and is following a secure
coding methodology. Which of the following methods would BEST assist the developers in
determining if any unknown vulnerabilities are present?
A.
Conduct web server load tests.
B.
Conduct static code analysis.
C.
Conduct fuzzing attacks.
D.
Conduct SQL injection and XSS attacks.