ExamGecko
Question list
Search
Search

Related questions











Question 764 - CISA discussion

Report
Export

An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?

A.
Restricted host IP addresses of simulated attacks
Answers
A.
Restricted host IP addresses of simulated attacks
B.
Testing techniques of simulated attacks
Answers
B.
Testing techniques of simulated attacks
C.
Source IP addresses of simulated attacks
Answers
C.
Source IP addresses of simulated attacks
D.
Timing of simulated attacks
Answers
D.
Timing of simulated attacks
Suggested answer: C
asked 18/09/2024
Dinuka Darshana
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first