Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you are tasked with evaluating the security of a network application. If your goal is to assess its resilience to attacks that may corrupt data handled by the application, which action would BEST demonstrate the application's vulnerability to data corruption?

  • Intercepting traffic between the application and its clients to analyze data packets

  • Overloading the application with an intentional buffer overflow

  • Conducting fuzz testing by sending a variety of malformed inputs to the application

  • Jamming the network to interrupt the application's transmission

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.