Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

A.
Fuzzing

B.
Compiling

C.
Code reviews

D.
Vulnerability scanning



Leave a Reply 0

Your email address will not be published. Required fields are marked *