PrepAway - Latest Free Exam Questions & Answers

which shows vulnerabilities that were actually exploited?

A security program manager wants to actively test the security posture of a system. The system is
not yet in production and has no uptime requirement or active user base. Which of the following
methods will produce a report which shows vulnerabilities that were actually exploited?

PrepAway - Latest Free Exam Questions & Answers

A.
Peer review

B.
Component testing

C.
Penetration testing

D.
Vulnerability testing

7 Comments on “which shows vulnerabilities that were actually exploited?

          1. rsm says:

            Pen tests can be performed on any environment. The key point is that a pen simulates an actual attack. Pen testing is external security testing conducted from outside the organization’s security perimeter. It involves an active analysis for many potential vulnerabilities, with the attack only being limited by the ‘rules of engagement’, or the scope of work.
            Whether the environment is development, QA, production, or anything else is not relevant.
            Best wishes to all on the exam.




            0



            0

Leave a Reply