Discuss the four activities on which the penetration testing methods are based.

What will be an ideal response?


Testing methods are based around four activities. The first of these is discovery, which is where the target is identified and documented. This is followed by enumeration, where the tester attempts to gain more knowledge about the target through various kinds of intrusions. Once the knowledge is obtained, vulnerability mapping takes place. This is where the tester maps what is known about the test environment to recognized vulnerabilities. Finally, once the vulnerabilities have been mapped into the target environment, the tester attempts to gain access. The results of the exploits that are run can help an organization identify vulnerabilities, gaps, intrusion response capability, monitoring and logging capability, and reporting.

Computer Science & Information Technology

You might also like to view...

Be certain to combine HTTP basic authentication with _____ to protect all parts of a web transaction.

a. password hashing b. auto_prepend_file c. SSL d. password salting

Computer Science & Information Technology

____ design is an approach to Web design that creates sites that change to accommodate the user's screen size, platform, and device orientation.

A. Fluid B. Adaptive C. Dynamic D. Static

Computer Science & Information Technology

Which of the following is NOT true when changing a form theme?

A) Once a theme is applied to the form, the colors and fonts can be changed independently of the theme, so you can combine the colors of one theme and a font of another. B) Changing the theme will not only change the colors of the form but also the font type and size and any border colors or object colors added to the form. C) Because the form is displayed in Form view, once it is created, the first step is to switch to Layout view to make changes to the form itself. D) By default, Access uses the Office theme when you create a form using AutoForm.

Computer Science & Information Technology

The crosshair icon determines the point of origin automatically only when you enter values directly into the Control panel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology