List of questions
Related questions
Question 195 - PT0-002 discussion
A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?
A.
Weak authentication schemes
B.
Credentials stored in strings
C.
Buffer overflows
D.
Non-optimized resource management
Your answer:
0 comments
Sorted by
Leave a comment first