Which of the following is a software vulnerability that can be avoided by using input validation?
A. Buffer overflow
B. Application fuzzing
C. Incorrect input
D. Error handling
Answer: C. Incorrect input
Computer Science & Information Technology
You might also like to view...
A(n) ________ report is formatted so it can be printed on mailing labels
A) label B) mail merge C) address D) contact list
Computer Science & Information Technology
Which of the following definitions is the best description of an orphan?
A) The last word of a paragraph split across a line break B) The location of a file preceding the filename C) The last line split from the paragraph across a page break D) The amount of white space around the edge of each page
Computer Science & Information Technology