Which of the following levels of difficulty would be required to exploit this vulnerability?

A security analyst was provided with a detailed penetration report, which was performed against the organization’s DMZ environment. It was noted on the report that a finding has a CVSS base score of 100.

Which of the following levels of difficulty would be required to exploit this vulnerability?
A . Very difficult; perimeter systems are usually behind a firewall
B . Somewhat difficult, would require significant processing power to exploit
C . Trivial, little effort is required to exploit this finding
D . Impossible; external hosts are hardened to protect against attacks

Answer: C

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments