Which of the following is a software vulnerability that…

Which of the following is a software vulnerability that can be avoided by using input validation?

Which of the following is a software vulnerability that can be avoided by using input validation?

A.
Buffer overflow

B.
Application fuzzing

C.
Incorrect input

D.
Error handling



Leave a Reply 0

Your email address will not be published. Required fields are marked *