New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISTQB ATTA Exam - Topic 2 Question 120 Discussion

Actual exam question for ISTQB's ATTA exam
Question #: 120
Topic #: 2
[All ATTA Questions]

To address the second risk mentioned in the scenario, security testing will be performed. Which test techniques would be most applicable for security testing? 1 credit [K2]

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Dorothy
4 days ago
I remember practicing with a question about security testing techniques, and I think static code analysis might be relevant too.
upvoted 0 times
...
Ernest
10 days ago
I think we discussed techniques like penetration testing and vulnerability scanning in class, but I'm not entirely sure which ones are best for this scenario.
upvoted 0 times
...
Ruth
15 days ago
Hmm, security testing techniques... I'm thinking things like penetration testing, vulnerability assessments, and maybe some kind of security auditing. The key is figuring out which ones would work best for the specific scenario described in the question.
upvoted 0 times
...
Tamar
20 days ago
No problem, I've got this. Security testing is all about finding weaknesses and exploits, so I'd go with things like network sniffing, fuzzing, and social engineering attacks. Gotta think like a hacker to beat a hacker, you know?
upvoted 0 times
...
Hobert
25 days ago
I'm a little unsure about the specific techniques for security testing. I know it involves assessing the system's defenses, but the question is asking which ones would be "most applicable" in this scenario. I'll have to do some research on that.
upvoted 0 times
...
Cary
1 month ago
Okay, security testing - that's gotta be things like penetration testing, vulnerability scanning, and maybe some kind of ethical hacking, right? I'll need to review those a bit before the exam.
upvoted 0 times
...
Tandra
1 month ago
Hmm, this seems like a straightforward question about security testing techniques. I'll need to think through the different types and which would be most applicable.
upvoted 0 times
...

Save Cancel