Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
A.
Application baseline
B.
Application hardening
C.
Secure coding
D.
Fuzzing
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
A.
Application baseline
B.
Application hardening
C.
Secure coding
D.
Fuzzing