Which of the following vulnerabilities is the security consultant MOST likely to identify?
A software company has hired a security consultant to assess the security of the company’s software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary.
Which of the following vulnerabilities is the security consultant MOST likely to identify?
A . Weak authentication schemes
B. Credentials stored in strings
C. Buffer overflows
D. Non-optimized resource management
Answer: C
Explanation:
fuzzing introduces unexpected inputs into a system and watches to see if the system has any negative reactions to the inputs that indicate security, performance, or quality gaps or issues
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments