A

Admin • 658.71K Points
Coach

Q. Security exploit is

  • (A) a prepared application that takes advantage of a known weakness.
  • (B) a tool used to quickly check computers on a network for known weaknesses.
  • (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  • (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  • Correct Answer - Option(A)
  • Views: 1
  • Filed under category Computer
  • Hashtags:

Explanation by: Admin

(A) a prepared application that takes advantage of a known weakness:
Correct. This is the definition of a security exploit. It targets vulnerabilities in software or systems to perform unauthorized actions.

(B) a tool used to quickly check computers on a network for known weaknesses:
This describes a vulnerability scanner, not an exploit.

(C) an application that captures TCP/IP data packets…:
This refers to a packet sniffer or network sniffer, which may be used maliciously but is not itself an exploit.

(D) a situation in which one person or program successfully masquerades as another…:
This describes spoofing, a form of attack, but not specifically a security exploit.

Conclusion:

(A) best defines a security exploit.

You must be Logged in to update hint/solution

Discusssion

Login to discuss.

Be the first to start discuss.