Which of the following should be used to identify overflow vulnerabilities?
A.
Fuzzing
B.
Input validation
C.
Privilege escalation
D.
Secure coding standards
Which of the following should be used to identify overflow vulnerabilities?
Which of the following should be used to identify overflow vulnerabilities?
A.
Fuzzing
B.
Input validation
C.
Privilege escalation
D.
Secure coding standards