CompTIA PenTest+ PT0-002 Practice Question
During a penetration test, you are tasked with evaluating the security of a network application. If your goal is to assess its resilience to attacks that may corrupt data handled by the application, which action would BEST demonstrate the application's vulnerability to data corruption?
Conducting fuzz testing by sending a variety of malformed inputs to the application
Jamming the network to interrupt the application's transmission
Overloading the application with an intentional buffer overflow
Intercepting traffic between the application and its clients to analyze data packets