A security administrator is assessing a new application. The application uses an API that is supposed to encrypt
text strings that are stored in memory. How might the administrator test that the strings are indeed encrypted in
memory?
A.
Use fuzzing techniques to examine application inputs
B.
Run nmap to attach to application memory
C.
Use a packet analyzer to inspect the strings
D.
Initiate a core dump of the application
E.
Use an HTTP interceptor to capture the text strings