A company hired an ethical hacker to assess its security posture. After the assessment, the hacker provided a detailed report showing several vulnerabilities but did not exploit any. Which type of test did the hacker most likely perform?
- Penetration Test
- Red Team Exercise
- Security Audit
- Vulnerability Assessment
The hacker likely performed a Vulnerability Assessment, which identifies vulnerabilities without exploiting them. A Penetration Test would involve exploiting vulnerabilities.
Loading...
Related Quiz
- In the context of CSP, what does the 'nonce' attribute help with?
- In the context of operating systems, what is the primary purpose of a security policy?
- How does a network-based IDS (NIDS) differ from a host-based IDS (HIDS)?
- In the context of BYOD policies, what refers to the isolation of personal and work data on a single device?
- What is the primary purpose of a strong password policy in user authentication?