If a White Hat researcher discovers a vulnerability in a software product, what should she do with the information?
A) Create a tutorial complete with screenshots and submit the finding to digg.com and slashdot.org
B) Call the vendor and offer to keep quiet if they pay you a finder's fee
C) Prove the exploit works, then sell a script on eBay
D) Report the vulnerability to a regional emergency response organization
Correct Answer:
Verified
Q9: Hosts can often be attacked in layers.
Q10: Another way to describe risk is:
A) A
Q11: Which of the following is considered to
Q12: When attackers have gained and then maintained
Q13: An attacker wants to make changes to
Q15: Someone downloads a tool from the Internet
Q16: What is the threshold for the amount
Q17: Which of the following statutes says that
Q18: Which of the following statements are most
Q19: If attackers experimenting with the latest botnet
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents