When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company’s contact with the cloud provider prevents any activities that would interfere with the cloud provider’s other customers.

When engaging with a penetration-testing company to test the application, which of the following should the company avoid?
A . Crawling the web application’s URLs looking for vulnerabilities
B . Fingerprinting all the IP addresses of the application’s servers
C . Brute forcing the application’s passwords
D . Sending many web requests per second to test DDoS protection

Answer: D

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments