COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
A
Eavesdropping
B
Hacking
C
Impersonation
D
Penetration testing
Explanation: 

Detailed explanation-1: -A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities.

Detailed explanation-2: -Vulnerability scanners alert companies to the preexisting flaws in their code and where they are located. Penetration tests attempt to exploit the vulnerabilities in a system to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat to the application.

Detailed explanation-3: -Password Attacks and Default Password. Password attacks are very common in the security industry, which is mostly due to using weak and default passwords. Operating System Attacks. Application Level Attacks. Misconfiguration Issues. Cross-Site Scripting (XSS) Misconfiguration Issues.

There is 1 question to complete.