ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 195 - PT0-002 discussion

Report
Export

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

A.
Weak authentication schemes
Answers
A.
Weak authentication schemes
B.
Credentials stored in strings
Answers
B.
Credentials stored in strings
C.
Buffer overflows
Answers
C.
Buffer overflows
D.
Non-optimized resource management
Answers
D.
Non-optimized resource management
Suggested answer: C

Explanation:

fuzzing introduces unexpected inputs into a system and watches to see if the system has any negative reactions to the inputs that indicate security, performance, or quality gaps or issues

asked 02/10/2024
Thao Nguyen
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first