Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications.Which of the following best describes what she will do?
A. Enter random or invalid data into the application in an attempt to cause it to fault
B. Work with the developers to eliminate horizontal privilege escalation opportunities
C. Test the applications for the existence of built-in- back doors left by the developers
D. Hash the application to verify it won't cause a false positive on the HIPS
Answer: A. Enter random or invalid data into the application in an attempt to cause it to fault
You might also like to view...
For students who cannot afford Microsoft Office, ________ provides a nice alternative
Fill in the blank(s) with correct word
Case AC 4-2Zack wants to create a custom form to match a paper form that he uses everyday in the office.Zack has opened the Field List pane and wants to add a field to the form. What should he do?
A. Double-click a field in the Field List B. Click Create Field on the Ribbon C. Both a. and b. D. Neither a. nor b.