asked 32.7k views
2 votes
The company CIO wants you and your team to check the security of the network by simulating an attack by malicious individuals. He is asking you to Select one:

a. Do something illegal
b. Conduct a vulnerability assessment
c. Conduct a penetration test
d. Perform a risk assessment

asked
User Altia
by
7.7k points

1 Answer

1 vote

Answer:

c. Conduct a penetration test

Step-by-step explanation:

To check for exploitable vulnerabilities, a penetration test, also known as a pen test, is a virtual cyber attack against your computer system.

Penetration testing is widely used to increase a web application firewall (WAF) in the sense of security for web applications.

Pen testing may include attempting to breach any number of application systems to identify vulnerabilities, such as unauthenticated inputs vulnerable to code injection attacks.

answered
User Steve Gattuso
by
7.8k points
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.