Which of the following is a software vulnerability that can be avoided by using input validation?

Which of the following is a software vulnerability that can be avoided by using input validation?

Which of the following is a software vulnerability that can be avoided by using input validation?

A.
Buffer overflow

B.
Application fuzzing

C.
Incorrect input

D.
Error handling



Leave a Reply 1

Your email address will not be published. Required fields are marked *

12 − 10 =


Cosmin

Cosmin

Buffer overflow is correct.