According to the NIST SAMATE, dynamic analysis tools operate by generating runtime vulnerability scenario using some functions. Which of the following are functions that are used by the dynamic analysis tools and are summarized in the NIST SAMATE? Each correct answer represents a complete solution. Choose all that apply.
A. Implementation attack
B. Source code security
C. File corruption
D. Network fault injection
A. Implementation attack
B. Source code security
C. File corruption
D. Network fault injection