📊 Computer
Q. Security exploit is
  • (A) a prepared application that takes advantage of a known weakness.
  • (B) a tool used to quickly check computers on a network for known weaknesses.
  • (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  • (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
✅ Correct Answer: (A) a prepared application that takes advantage of a known weakness.

Explanation:

(A) a prepared application that takes advantage of a known weakness:
Correct. This is the definition of a security exploit. It targets vulnerabilities in software or systems to perform unauthorized actions.

(B) a tool used to quickly check computers on a network for known weaknesses:
This describes a vulnerability scanner, not an exploit.

(C) an application that captures TCP/IP data packets…:
This refers to a packet sniffer or network sniffer, which may be used maliciously but is not itself an exploit.

(D) a situation in which one person or program successfully masquerades as another…:
This describes spoofing, a form of attack, but not specifically a security exploit.

Conclusion:

(A) best defines a security exploit.

Explanation by: Mr. Dubey

(A) a prepared application that takes advantage of a known weakness:
Correct. This is the definition of a security exploit. It targets vulnerabilities in software or systems to perform unauthorized actions.

(B) a tool used to quickly check computers on a network for known weaknesses:
This describes a vulnerability scanner, not an exploit.

(C) an application that captures TCP/IP data packets…:
This refers to a packet sniffer or network sniffer, which may be used maliciously but is not itself an exploit.

(D) a situation in which one person or program successfully masquerades as another…:
This describes spoofing, a form of attack, but not specifically a security exploit.

Conclusion:

(A) best defines a security exploit.

💬 Discussion


📊 Question Analytics

👁️
891
Total Visits
📽️
5 y ago
Published
🎖️
Tina Singh
Publisher
📈
86%
Success Rate