exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 73 discussion

Actual exam question from CompTIA's PT0-002
Question #: 73
Topic #: 1
[All PT0-002 Questions]

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

  • A. Weak authentication schemes
  • B. Credentials stored in strings
  • C. Buffer overflows
  • D. Non-optimized resource management
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 11 months, 2 weeks ago
C. Buffer overflows Fuzzing is a technique used to identify vulnerabilities in software by providing unexpected or invalid input to the software. The goal of fuzzing is to find bugs and vulnerabilities in the software by stressing its inputs and identifying unexpected behavior. One type of vulnerability that is commonly identified through fuzzing is buffer overflows. A buffer overflow occurs when a program attempts to store more data in a buffer than it can hold, which can lead to a crash or allow an attacker to execute malicious code. It is important to note that options A, B, and D are also potential vulnerabilities that can be identified during a security assessment, but they are not as likely to be identified through fuzzing as buffer overflows. Weak authentication schemes, Credentials stored in strings, and Non-optimized resource management are also important security issues but they are not directly related to fuzzing.
upvoted 8 times
...
KeToopStudy
Most Recent 10 months, 1 week ago
Selected Answer: C
Buffer overflow
upvoted 1 times
...
dcyberguy
1 year ago
Selected Answer: C
fuzzing introduces unexpected inputs into a system and watches to see if the system has any negative reactions to the inputs that indicate security, performance, or quality gaps or issues
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...