Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
A. Header manipulation
B. Steganography
C. Input validation
D. Fuzzing
Answer: D. Fuzzing
Computer Science & Information Technology
You might also like to view...
If a VBA error occurs while Access is running a procedure, you are offered the choice of ending the procedure or entering debugging mode. Choosing to end the procedure opens the Visual Basic Editor with the incorrect line of code highlighted in yellow
Indicate whether the statement is true or false
Computer Science & Information Technology
When you cut text, you make a duplicate of the text, leaving the original text in its original location
Indicate whether the statement is true or false
Computer Science & Information Technology