which are then used to perform boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

Which of the following security concepts identifies input variables which are then used to perform
boundary testing?

A.
Application baseline

B.
Application hardening

C.
Secure coding

D.
Fuzzing



Leave a Reply 0

Your email address will not be published. Required fields are marked *