____________________, also known as "fuzzing," is a straight-forward technique that looks for vulnerabilities in a program or protocol by feeding random input into the program or the network running the protocol.

Fill in the blank(s) with the appropriate word(s).

Fuzz testing

Computer Science & Information Technology

You might also like to view...

A binary number system has only ________ parts

Fill in the blank(s) with correct word

Computer Science & Information Technology

The first field you choose to sort by is called the ________ field

Fill in the blank(s) with correct word

Computer Science & Information Technology