Using programming or scripting in an input field, in an attempt to find a vulnerability, is known as what?

  • Patching
  • Spoofing
  • Hardening
  • Injection

CompTIA Security+ SY0-401
  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
    • This question is filed here
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography