Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications.Which of the following best describes what she will do?

A. Enter random or invalid data into the application in an attempt to cause it to fault
B. Work with the developers to eliminate horizontal privilege escalation opportunities
C. Test the applications for the existence of built-in- back doors left by the developers
D. Hash the application to verify it won't cause a false positive on the HIPS

Answer: A. Enter random or invalid data into the application in an attempt to cause it to fault

Computer Science & Information Technology

You might also like to view...

For students who cannot afford Microsoft Office, ________ provides a nice alternative

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case AC 4-2Zack wants to create a custom form to match a paper form that he uses everyday in the office.Zack has opened the Field List pane and wants to add a field to the form.  What should he do?

A. Double-click a field in the Field List B. Click Create Field on the Ribbon C. Both a. and b. D. Neither a. nor b.

Computer Science & Information Technology