When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.
Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.
A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.
Basically, vulnerability assessments can be used in the following ways:
- Identify loopholes, risks and security threats.
- Prioritize and enhance an information system.
- Mitigate potential security threats.
A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.
This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.