CISSP PRACTICE QUESTIONS – 20200607

Effective CISSP Questions

A penetration testing team is conducting reconnaissance. Which of the following is the most likely output?
A. A list of services running on a host
B. A list of vulnerabilities identified by CVE
C. A list of network hosts
D. A list of unpatched services


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

My suggested answer is C. A list of network hosts.

Pen Testing Methodologies

There are various penetration testing methodologies, among which engagement procedures and terminologies may vary. For example, scanning may refer to network scanning or port scanning; discovery may refer to discover a network or enumerate services. So does the term reconnaissance or recon. Some treat reconnaissance as the first step of pen testing or the same as OSINT, an information gathering technique.

According to EC-Council’s LPT methodology, reconnaissance refers to scan, explore, or discover a network to gather information and generate a list of network hosts.

Reference


A BLUEPRINT FOR YOUR SUCCESS IN CISSP

My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and informative reference for security professionals.

Leave a Reply