Certified Ethical Hacker (CEHv9) Questions and answers
33. The "black box testing" methodology enforces which kind of restriction?
A. Only the external operation of a system is accessible to the tester.
B. The internal operation of a system is only partly accessible to the tester.
C. The internal operation of a system is completely known to the tester.
D. Only the internal operation of a system is known to the tester.
34. When you are testing a web application, it is very useful to employ a proxy tool to save every request
and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers
manually to get more precise results than if using web vulnerability scanners. What proxy tool will help you find web vulnerabilities?