CERTIVIEW

Wednesday, 4 May 2016

CEH v9 Question of the Week: Penetration Testing

CEH-v9-QOWGreenWhich of the following is an example of penetration testing?

A. Configuring firewall to block unauthorized traffic
B. Simulating an actual attack on a network
C. Configuring a network-based IDS on the network
D. Vulnerability scanning

Reveal Answer

The correct answer is B.

A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data.

The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.

 

Related Course
Certified Ethical Hacker v9

CEH v9 Question of the Week Series

  • CEH v9 Question of the Week: Retina Scanners
  • CEH v9 Question of the Week: Employee Behavior
  • CEH v9 Question of the Week: CVE-2007-2447
  • CEH v9 Question of the Week: SQL Injection
  • CEH v9 Question of the Week: Web Application Penetration Testing
  • CEH v9 Question of the Week: iptables
  • CEH v9 Question of the Week: Examine Streams of Packets
  • CEH v9 Question of the Week: Scans
  • CEH v9 Question of the Week: SQL Injection
  • CEH v9 Question of the Week: Standard Risk Assessment
  • CEH v9 Question of the Week: Penetration Testing


from
CERTIVIEW
Unknown at 03:13
Share

No comments:

Post a Comment

‹
›
Home
View web version

About Me

Unknown
View my complete profile
Powered by Blogger.