IT Examiner School eBook

Internal Use Only

Penetration Test (Pen Test)

Pen Test “tests” systems to find & exploit known vulnerabilities that an attacker could exploit

Determine if there are

Pen Test report will describe any weaknesses as “high”, “medium” or “low”

Require management’s knowledge & consent

Require a high degree of skill to perform

weaknesses and if able to access system functionality and data

Are intrusive as actual “attack” tools are used

Internal Use Only

Question 2 Fill in the blanks: A “vulnerability assessment” ______ vulnerabilities, while a “penetration test” _______

vulnerabilities. A. Assess; Corrects

B. Downloads new; Deletes old C. Scans for; Exploits discovered D. Exploits known; Discovers zero-day

Made with FlippingBook - Online magazine maker