CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 6 ■ Security Assessment and Testing (Domain 6) 149


C. sqlthrash
D. Nessus


  1. During a penetration test of her organization, Kathleen’s IPS detects a port scan that has
    the URG, FIN, and PSH flags set and produces an alarm. What type of scan is the pen-
    etration tester attempting?
    A. A SYN scan
    B. A TCP flag scan
    C. An Xmas scan
    D. An ACK scan

  2. Nmap is an example of what type of tool?


A. Vulnerability scanner
B. Web application fuzzer
C. Network design and layout
D. Port scanner


  1. What type of vulnerabilities will not be found by a vulnerability scanner?


A. Local vulnerabilities
B. Service vulnerabilities
C. Zero-day vulnerabilities
D. Vulnerabilities that require authentication


  1. MITRE’s CVE database provides what type of information?


A. Current versions of software
B. Patching information for applications
C. Vulnerability information
D. A list of costs versus effort required for common processes


  1. When designing an assessment following NIST SP 800-53A, which assessment component
    includes policies and procedures?
    A. Specifications
    B. Mechanisms
    C. Activities
    D. Individuals

Free download pdf