Multiple Choice
An internal penetration tester finds a legacy application that takes measurement input made in a text box and outputs a specific string of text related to industry requirements. There is no documentation about how this application works, and the source code has been lost. Which of the following would BEST allow the penetration tester to determine the input and output relationship?
A) Running an automated fuzzer
B) Constructing a known cipher text attack
C) Attempting SQL injection commands
D) Performing a full packet capture
E) Using the application in a malware sandbox
Correct Answer:

Verified
Correct Answer:
Verified
Q418: A security engineer is assessing a new
Q419: As part of the development process for
Q420: A company has completed the implementation of
Q421: Given the following: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg" alt="Given the
Q422: A security engineer successfully exploits an application
Q424: To meet an SLA, which of the
Q425: A systems administrator at a medical imaging
Q426: Which of the following may indicate a
Q427: A security architect has been assigned to
Q428: A company is the victim of a