Which of the following techniques can be used to prevent the disclosure of system information
resulting from arbitrary inputs when implemented properly?
A.
Fuzzing
B.
Patch management
C.
Error handling
D.
Strong passwords
Which of the following techniques can be used to prevent the disclosure of system information
resulting from arbitrary inputs when implemented properly?
Which of the following techniques can be used to prevent the disclosure of system information
resulting from arbitrary inputs when implemented properly?
A.
Fuzzing
B.
Patch management
C.
Error handling
D.
Strong passwords