1.

The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________(a) infiltrating(b) exploitation(c) cracking(d) hackingThis question was addressed to me in class test.My doubt is from Exploits and Exploitation in portion Cyber Security of Cyber Security

Answer»

The correct option is (b) exploitation

To EXPLAIN: The process of FINDING vulnerabilities and EXPLOITING them using exploitable SCRIPTS or programs are known as exploitation. VULNERABILITY scanners such as Nexpose and Nessus are used for finding such vulnerabilities and then they are exploited using such programs and scripts.



Discussion

No Comment Found

Related InterviewSolutions