CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 6 ■ Security Assessment and Testing (Domain 6) 133



  1. What technology should an organization use for each of the devices shown in the diagram
    to ensure that logs can be time sequenced across the entire infrastructure?
    A. Syslog
    B. NTP
    C. Logsync
    D. SNAP

  2. During a penetration test, Danielle needs to identify systems, but she hasn’t gained suf-
    ficient access on the system she is using to generate raw packets. What type of scan should
    she run to verify the most open services?
    A. A TCP connect scan
    B. A TCP SYN scan
    C. A UDP scan
    D. An ICMP scan

  3. During a port scan using nmap, Joseph discovers that a system shows two ports open that
    cause him immediate worry:
    21/open
    23/open


What services are likely running on those ports?
A. SSH and FTP
B. FTP and Telnet
C. SMTP and Telnet
D. POP3 and SMTP


  1. Saria’s team is working to persuade their management that their network has extensive
    vulnerabilities that attackers could exploit. If she wants to conduct a realistic attack as
    part of a penetration test, what type of penetration test should she conduct?
    A. Crystal box
    B. Gray box
    C. White box
    D. Black box

  2. What method is commonly used to assess how well software testing covered the potential
    uses of an application?
    A. A test coverage analysis
    B. A source code review
    C. A fuzz analysis
    D. A code review report

Free download pdf