
Answer-first summary for fast verification
Answer: Penetration testing.
## Explanation **Penetration testing (Option A)** is least prone to false positives or false negatives because: - **False positives**: Penetration testing involves controlled, authorized attempts to exploit vulnerabilities in a system. Since the tests are conducted by security professionals using known techniques, there is minimal risk of misidentifying normal activities as threats. - **False negatives**: While penetration testing might miss some vulnerabilities, it doesn't generate false negatives in the same way automated detection systems do. The results are based on actual exploitation attempts rather than pattern matching. **Comparison with other options:** - **Anomaly detection algorithm (Option B)**: Highly prone to both false positives (normal behavior flagged as anomalous) and false negatives (novel attacks not detected) - **Signature-based detection method (Option C)**: Prone to false negatives (new threats without known signatures) and some false positives - **Network behavior anomaly detection (Option D)**: Similar to option B, prone to both types of errors due to the statistical nature of anomaly detection Penetration testing provides definitive evidence of exploitable vulnerabilities rather than probabilistic detections, making it the most reliable in terms of accuracy.
Author: LeetQuiz .
Ultimate access to all questions.
No comments yet.