Question 1
Which of the following best describes the purpose of threat modeling in security testing?
Question 2
During input validation testing, which type of attack is primarily being mitigated by checking for unexpected input data?
Question 3
Which of the following is the most appropriate tool for conducting automated vulnerability scanning in a web application?
Question 4
In the context of security testing, what does the term 'fuzzing' refer to?
Question 5
In a security testing scenario, which of the following best describes the concept of 'least privilege'?