Which of the following methods is the correct way to validate the vulnerability?

A penetration tester wants to check manually if a "ghost" vulnerability exists in a system. Which of the following methods is the correct way to validate the vulnerability?
A. Download the GHOST file to a Linux system and compile gcc -o GHOST test i: ./GHOST
B. Download the GHOST file to a Windows system and compile gcc -o GHOST GHOST.c test i: ./GHOST
C. Download the GHOST file to a Linux system and compile gcc -o GHOST.c test i: ./GHOST
D. Download the GHOST file to a Windows system and compile gcc -o GHOST test i: ./GHOST

comptia-exams

3 thoughts on “Which of the following methods is the correct way to validate the vulnerability?

    1. What is about -o option? There is no output file name except in option B.
      Or the output file name is optional?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.