a. Does not determine the critical vulnerabilities
b. Cannot be used to identify the vulnerabilities left undetected by automated vulnerability scanners
c. Can evaluate the security of system or network
d. Is an unauthorized attempt to exploit a computer system
Solution: c. Can evaluate the security of system or network
a. Know the nature of the organization
b. System and network
c. Characteristics of work done in the firm
d. Type of broadband company used by the firm
Solution: d. Type of broadband company used by the firm
a. Privacy and security
b. Rules and regulations
c. Hacking techniques
d. Ethics to talk to sensors
Solution: a. Privacy and security
a. Black box testing
b. White box testing
c. Gray box testing
d. Blue box testing
Solution: c. Gray box testing
a. Black Box testing, White Box testing, Gray Box Testing
b. Black Box testing, Red Box Testing, Gray Box Testing
c. White Box testing, Brown Box Testing, Red Box Testing
d. None of the above
Solution: a. Black Box testing, White Box testing, Gray Box Testing
a. It is an unintentional attack
b. Pen-testing is used for security assessment
c. Pen testing improves the security of the system
d. Pen testing does discovers security weaknesses
Solution: a. It is an unintentional attack
a. Non-disclosure agreement
b. Legal agreement
c. Service level agreement
d. All of these
Solution: a. Non-disclosure agreement
a. Target
b. Attacker
c. Both target and attacker
d. None of them
Solution: a. Target
a. Code review
b. Vulnerability scan
c. Manual testing
d. All of them
Solution: a. Code review
a. Automated pen-testing
b. Manual pen-testing
c. Both of them
d. None of them
Solution: a. Automated pen-testing
a. A and D
b. C and D
c. A and B
d. B and C
Solution: c. A and B
a. Only B
b. Only D
c. A and C
d. B and C
Solution: d. B and C
a. Only B
b. Only D
c. C and D
d. B and C
Solution: d. B and C
a. B and C
b. B and D
c. C and D
d. All of them
Solution: b. B and D
a. Only A
b. Only C
c. C and D
d. A and C
Solution: c. C and D
Comments
Post a Comment