Match each item with a statement below.
A. A method for obtaining information about the way variables are used and defined in a program.
B. Can identify common symbols that the initiating programming language defines.
C. A great way to find SQL injection vulnerabilities.
D. A simple detection tool that searches for, and locates, user-defined strings and patterns found within source code.
E. A set of rules that defines the method by which hypertext requests and responses (Web requests and responses) are formatted and packaged.
F. An effort to find problems in the source code of a program while the program is inactive.
G. Defines a set of rules that ensures a reliable virtual connection for delivery of data from one machine to another.
H. Retrieves the information and dynamically builds the SQL statement to be forwarded to the application server or middleware.
I. Enables the interceptions and modification of HTTP requests, including GET and POST parameters.
A. data flow analysis
B. lexical analyzer
C. inferential testing
D. string-based matching
E. HTTP
F. static analysis
G. TCP
H. scripting language
I. proxy server
You might also like to view...
The Animation gallery is displayed by clicking the ________ button on the Animations tab
Fill in the blank(s) with correct word
Item D in the accompanying figure is the Object States panel.
Answer the following statement true (T) or false (F)