32.7k views
2 votes
The company CIO wants you and your team to check the security of the network by simulating an attack by malicious individuals. He is asking you to Select one:

a. Do something illegal
b. Conduct a vulnerability assessment
c. Conduct a penetration test
d. Perform a risk assessment

User Altia
by
4.5k points

1 Answer

1 vote

Answer:

c. Conduct a penetration test

Step-by-step explanation:

To check for exploitable vulnerabilities, a penetration test, also known as a pen test, is a virtual cyber attack against your computer system.

Penetration testing is widely used to increase a web application firewall (WAF) in the sense of security for web applications.

Pen testing may include attempting to breach any number of application systems to identify vulnerabilities, such as unauthenticated inputs vulnerable to code injection attacks.

User Steve Gattuso
by
5.1k points