Which of the following should be used to identify overflow vulnerabilities?

Which of the following should be used to identify overflow vulnerabilities?

Which of the following should be used to identify overflow vulnerabilities?

A.
Fuzzing

B.
Input validation

C.
Privilege escalation

D.
Secure coding standards



Leave a Reply 0

Your email address will not be published. Required fields are marked *