Chapter 6Security Assessment and Testing (Domain 6)
SUBDOMAINS
- 6.1 Design and validate assessment, test, and audit strategies
- 6.2 Conduct security controls testing
- 6.3 Collect security process data (e.g., technical, and administrative)
- 6.4 Analyze test output and generate report
- 6.5 Conduct or facilitate security audits
- During a port scan, Susan discovers a system running services on TCP and UDP 137–139 and TCP 445, as well as TCP 1433. What type of system is she likely to find if she connects to the machine?
- A Linux email server
- A Windows SQL server
- A Linux file server
- A Windows workstation
- Which of the following is a method used to automatically design new software tests and to ensure the quality of tests?
- Code auditing
- Static ...
Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.