Describe penetration testing.

What will be an ideal response?


Penetration testing generally involves four standard activities. The first of these is exploration, which is where the target is identified and characterized. The second step is examination, which is where different probes are used to gather data that will support the attack. These are typically tool-based. A map of the avenues of attack is then drawn from those probes. Once the target is fully understood, the tester will attempt the exploit that was planned. The final phase in the process is the documentation of findings, typically in the form of a report to the management of the organization sponsoring the penetration test. The results of this report can help an organization evaluate the effectiveness of its defenses as well as its ability to respond to incidents. That understanding can lead to better means of responding to incidents involving applications, networks, and behavioral or physical exploits.

Computer Science & Information Technology

You might also like to view...

Given the definition and code fragment:

``` int matrix[2][3]; int k = 0; for(int i =0; i < 3; i++) for (int j=0, j < 4; j++) matrix[i][j] = k++; ``` The value of matrix[0][0] is a) 0 b) 1 c) 2 d) 3 e) 4

Computer Science & Information Technology

The Paste in Front command pastes the contents of the clipboard in front of a selected object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can clear leveling in ____ view.

A. Network Diagram B. Gantt C. Reallocation D. All of the above

Computer Science & Information Technology

The Check Compatibility feature searches for ____.

A. reminder notes B. ink annotations C. unsupported features D. encrypted digital signatures

Computer Science & Information Technology