Exam PCDRA All QuestionsBrowse all questions from this exam
Question 38

Which of the following is an example of a successful exploit?

    Correct Answer: B

    A successful exploit involves executing code that takes advantage of a vulnerability in a system or application to achieve an unauthorized outcome. Executing code that exploits a vulnerability clearly demonstrates a successful breach of security. Identifying vulnerable services or connecting media with malware are preliminary steps that could lead to an exploit but do not themselves constitute successful exploitation. Similarly, running well-known signed software is not related to exploitation.

Discussion
FlkyOption: B

From documentation : "An exploit is a piece of code or a program that takes advantage of a weakness (aka vulnerability) in an application or system." https://www.paloaltonetworks.com/cyberpedia/malware-vs-exploits

SR_RSOption: B

should be B. identifying a vulnerability is not a successful exploit. executing code to take advantage of the vulnerability should be a successful exploit. unless i am reading it wrongly

abd1234Option: B

B is the exploit

tobajaOption: B

B is right

ChiquitabanditaOption: B

b seems like best answer but A is not a good thing either, A at least did not get executed, only uploaded.

SR_RSOption: B

unless we see it differently. executing a code that take advantage of a vulnerability (does not mean it will be successful) but able to identify vulnerabilities in a SERVER (mean that a bad actor manages to get past security)