In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
A walk-through test is not typically used to circumvent security features of an information system. Rather, it is a type of static testing that is used to review the design and code of a system to identify any potential issues such as syntax errors, logical errors, or other issues that may arise. A walk-through test is used to identify and correct problems before the system is deployed or tested.
In contrast, a penetration test is a type of dynamic testing where the tester attempts to exploit vulnerabilities and circumvent security features of an information system. The goal of a penetration test is to simulate an attack on a system to identify potential security weaknesses.
The testing methodology in which assessors use all available documentation, work under no constraints, and attempt to circumvent the security features of an information system is:
B. Penetration test
Penetration testing, also known as ethical hacking, involves simulating real-world attacks on an information system to identify vulnerabilities and assess its security posture. In this testing methodology, assessors have access to all available documentation, work without constraints, and attempt to exploit security weaknesses in the system.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
74gjd_37
5 months, 2 weeks agoanuradha1306
9 months, 2 weeks ago4e3rv21rq3vq2q
1 year, 8 months ago