PrepAway - Latest Free Exam Questions & Answers

Open box testing, in the Flaw Hypothesis Methodology of Penetration Testing applies to the analysis of

Open box testing, in the Flaw Hypothesis Methodology of Penetration Testing applies to the analysis
of

PrepAway - Latest Free Exam Questions & Answers

A.
Routers and firewalls

B.
Host-based IDS systems

C.
Network-based IDS systems

D.
General purpose operating systems

Explanation:
Flaw Hypothesis Methodology – A system analysis and penetration technique where specifications
and documentation for the system are analyzed and then flaws in the system are hypothesized.
The list of hypothesized flaws is then prioritized on the basis of the estimated probability that a flaw
actually exists and, assuming a flaw does exist, on the ease of exploiting it and on the extent of
control or compromise it would provide. The prioritized list is used to direct the actual testing of the
system.
http://www.kernel.org/pub/linux/libs/security/Orange-Linux/refs/Orange/Orange0-5.html


Leave a Reply