What is the difference between a vulnerability and an exploit?



 What is the difference between a vulnerability and an exploit?..

Answer / chaitanya

A lot of people would say that they are the same thing, and in a sense they would be right. However, one is a potential problem while the other is an active problem. Think of it like this: You have a shed with a broken lock where it won’t latch properly. In some areas such as major cities, that would be a major problem that needs to be resolved immediately, while in others like rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it would be a vulnerability, while the major cities shed would be an example of an exploit – there are people in the area, actively exploiting a known problem.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

What is a driver in computer?

0 Answers  


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

0 Answers  


 What are salted hashes?

1 Answers  


What is data protection in transit vs data protection at rest?

1 Answers  


 What’s the difference between a White Box test and a Black Box test?

2 Answers  






What is meant by computer application?

0 Answers  


What is a table in computer?

0 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


What do you think of social networking sites such as Facebook and LinkedIn?

1 Answers  


 What is the Chain of Custody?

1 Answers  


How many security protocols available?

1 Answers  


On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)