Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you are tasked with evaluating the security of a network application. If your goal is to assess its resilience to attacks that may corrupt data handled by the application, which action would BEST demonstrate the application's vulnerability to data corruption?

  • Intercepting traffic between the application and its clients to analyze data packets

  • Jamming the network to interrupt the application's transmission

  • Overloading the application with an intentional buffer overflow

  • Conducting fuzz testing by sending a variety of malformed inputs to the application

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot