For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeAQA GCSEAQA GCSE Computer Science Paper 2Question 16.2
    Medium2 marksStructured
    Cyber securityGeneralcyber securitypenetration testingwhite-box

    AQA GCSE · Question 16.2 · Cyber security

    Describe the aim of a white-box penetration test.

    How to approach this question

    1. First, understand what "white-box" means in this context. It implies transparency, that the tester can "see inside" the system. 2. Contrast this with "black-box" testing, where the tester has no prior knowledge. 3. Explain what information the white-box tester is given (e.g., source code, diagrams). 4. State the aim: what does this level of access allow the tester to do? (A more thorough and deep analysis to find flaws that an external attacker might miss).

    Full Answer

    The aim of a white-box penetration test is to simulate an attack from the perspective of an insider who has full knowledge of the system. The testers are given access to source code, network diagrams, and other internal information to conduct a thorough and comprehensive analysis of the code and infrastructure to find every possible security flaw, not just those visible from the outside.
    There are different types of penetration testing, categorized by the amount of information given to the tester. In a **white-box penetration test**, the ethical hacker is provided with complete information about the target system. This includes access to source code, network maps, credentials, and system architecture diagrams. The aim of this approach is not just to see if an external attacker can get in (that's black-box testing), but to perform a very thorough and deep security audit from the perspective of someone with insider knowledge. By having full access, the testers can analyze the code and system design line-by-line to find deeply embedded or complex security flaws that would be very difficult or impossible to discover from the outside.

    Common mistakes

    ✗ Confusing white-box with black-box testing (where the tester has no knowledge). ✗ Stating that the aim is to simulate an external attacker. ✗ Vague answers like "to test the system".
    Question 16.1All questionsQuestion 17.1

    Practice the full AQA GCSE Computer Science Paper 2

    46 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01.1Convert the binary number 11010100 into decimal.EasyQ01.2Convert the binary number 10111001 into hexadecimal. You should show your working.MediumQ01.3State the largest decimal number that can be represented using 6 bits.EasyQ02.1Add together the following three binary numbers and give your answer in binary. 00110110 1001...MediumQ02.2Apply a binary shift three places to the right on the bit pattern 10101000. Give the result using...Easy
    View all 46 questions →