A well-known hacker started her own computer security consulting business.Many companies pay her to attempt to gain unauthorized access to their network.If she is successful,she offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?
A) Penetration test.
B) Vulnerability scan.
C) Deep packet inspection
D) Buffer overflow test.
Correct Answer:
Verified
Q51: Compatibility tests utilize a(n)_,which is a list
Q52: Which of the following preventive controls are
Q53: The process that allows a firewall to
Q54: The most common input-related vulnerability is called
Q55: _ is an authorized attempt by an
Q57: An access control matrix
A)is the process of
Q58: A separate network located outside the organization's
Q59: The process of maintaining a table listing
Q60: The security technology that evaluates IP packet
Q61: Describe what information security process the term
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents