Certified Ethical Hacker – CEH – 312-50 – Question372

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?


A.
Fuzzy-testing the code
B. Third party running the code
C. Sandboxing the code
D. String validating the code

Correct Answer: A