Which of the following application security principles involves inputting random data into a program?
Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?
Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?
Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?
Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?