Reader small image

You're reading from  CISSP (ISC)² Certification Practice Exams and Tests

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781800561373
Edition1st Edition
Right arrow
Author (1)
Ted Jordan
Ted Jordan
author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan

Right arrow

Answers with explanations

  1. Answer: D Both types of testing are done in physical, logical, and administrative environments, and both search for vulnerabilities, but penetration testing takes the extra step of running exploits, ideally doing no harm.
  2. Answer: C After defining the scope of an audit, penetration testing includes reconnaissance, enumeration, vulnerability analysis, launching the exploit, and documenting the final report for management.
  3. Answer: B This question is intentionally vague because the real exam contains some questions like this where certain likely assumptions must be made; that is, to conduct a remote audit, there will need to be a live video feed. Dial-up internet is too slow for viewing the video stream from the audit site. Remote audits are allowed, if necessary, for example, during a worldwide pandemic. Corporate policies should cover whether an employee can be on camera. You can learn more about audits at https://iaf.nu/articles/FAQ/288.
  4. Answer...
lock icon
The rest of the page is locked
Previous PageNext Chapter
You have been reading a chapter from
CISSP (ISC)² Certification Practice Exams and Tests
Published in: Sep 2021Publisher: PacktISBN-13: 9781800561373

Author (1)

author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan