Which of the following is a software vulnerability that can be avoided by using input validation?
A.
Buffer overflow
B.
Application fuzzing
C.
Incorrect input
D.
Error handling
Which of the following is a software vulnerability that can be avoided by using input validation?
Which of the following is a software vulnerability that can be avoided by using input validation?
A.
Buffer overflow
B.
Application fuzzing
C.
Incorrect input
D.
Error handling