Which of the following levels of difficulty would be required to exploit this vulnerability?
A security analyst was provided with a detailed penetration report, which was performed against the organization’s DMZ environment. It was noted on the report that a finding has a CVSS base score of 100.
Which of the following levels of difficulty would be required to exploit this vulnerability?
A . Very difficult; perimeter systems are usually behind a firewall
B . Somewhat difficult, would require significant processing power to exploit
C . Trivial, little effort is required to exploit this finding
D . Impossible; external hosts are hardened to protect against attacks
Answer: C
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments