ISC2 CISSP Practice Question
A financial services company is developing a new mobile banking application that will interact with their existing backend systems through multiple APIs. During the security assessment phase, the security team needs to evaluate these APIs for potential security vulnerabilities. Which of the following testing approaches would be BEST for identifying authentication bypass vulnerabilities in the application's APIs?
Port scanning the backend servers hosting the APIs
Schema validation testing of API request and response formats
Load testing the APIs to measure their performance under stress
Fuzzing the API endpoints with unexpected input values