which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *

4 × 3 =