Multiple Choice
What is the name for the code that can be executed by unauthorized users within a software product?
A) vulnerability surface
B) risk profile
C) input surface
D) attack surface
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q17: Describe a penetration testing report.
Q25: A service contract between a vendor and
Q26: Vulnerability scans are usually performed from outside
Q27: _ for organizations are intended to identify
Q28: What term below describes the start-up relationship
Q28: List two types of hardening techniques.
Q29: Which item below is an imaginary line
Q31: The goal of what type of threat
Q34: Match the following terms to the appropriate
Q35: An administrator running a port scan wants