69.8k views
0 votes
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?

a) Penetration test
b) Vulnerability scan
c) Intrusive
d) Gray box
e) Credentialed vulnerability scan
f) Non-credentialed vulnerability scan

User Brendaliz
by
4.2k points

2 Answers

1 vote

Answer:

a) Penetration test

Step-by-step explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

User Arvind
by
4.1k points
6 votes

When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.

Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.

A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.

Basically, vulnerability assessments can be used in the following ways:

  • Identify loopholes, risks and security threats.
  • Prioritize and enhance an information system.
  • Mitigate potential security threats.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.

This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.

User Gregory Mostizky
by
4.3k points