A. Configuring firewall to block unauthorized traffic
B. Simulating an actual attack on a network
C. Configuring a network-based IDS on the network
D. Vulnerability scanning
The correct answer is B.
A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data.
The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.
Certified Ethical Hacker v9