O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Which one of the following is considered the BEST penetration testing method when the organization wants to ascertain the hacking possibilities from external networks to the internal systems?

  1. Black box testing
  2. Blue box testing
  3. Grey box testing
  4. White box testing

Q2. Vulnerabilities in IT systems are considered:

  1. Holes or errors
  2. Software functionality
  3. Hardware functionality
  4. None of the above

Q3. Which of the following step is not a vulnerability assessment and penetration testing process?

  1. Scope
  2. Result analysis
  3. Software development
  4. Reporting

Q4. Common Vulnerabilities and Exposures (CVE) is a:

  1. Dictionary
  2. Database
  3. Software program
  4. Vulnerability

Q5. The National Vulnerability Database (NVD) provides:

  1. Common Software defects
  2. Common Vulnerability Scoring ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required