Which of the following techniques floods an application with data in an attempt to find vulnerabilities?

A. Header manipulation
B. Steganography
C. Input validation
D. Fuzzing

Answer: D. Fuzzing

Computer Science & Information Technology

You might also like to view...

If a VBA error occurs while Access is running a procedure, you are offered the choice of ending the procedure or entering debugging mode. Choosing to end the procedure opens the Visual Basic Editor with the incorrect line of code highlighted in yellow

Indicate whether the statement is true or false

Computer Science & Information Technology

When you cut text, you make a duplicate of the text, leaving the original text in its original location

Indicate whether the statement is true or false

Computer Science & Information Technology