Which of the following allows an attacker to identify vulnerabilities within a closed source software application?
A.
Fuzzing
B.
Compiling
C.
Code reviews
D.
Vulnerability scanning
Which of the following allows an attacker to identify vulnerabilities within a closed source software application?
Which of the following allows an attacker to identify vulnerabilities within a closed source software application?
A.
Fuzzing
B.
Compiling
C.
Code reviews
D.
Vulnerability scanning