ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 1319 - CISSP discussion

Report
Export

Which of the following vulnerability assessment activities BEST exemplifies the Examine method of assessment?

A.
Ensuring that system audit logs capture all relevant data fields required by the security controls baseline
Answers
A.
Ensuring that system audit logs capture all relevant data fields required by the security controls baseline
B.
Performing Port Scans of selected network hosts to enumerate active services
Answers
B.
Performing Port Scans of selected network hosts to enumerate active services
C.
Asking the Information System Security Officer (ISSO) to describe the organization's patch management processes
Answers
C.
Asking the Information System Security Officer (ISSO) to describe the organization's patch management processes
D.
Logging into a web server using the default administrator account and a default password
Answers
D.
Logging into a web server using the default administrator account and a default password
Suggested answer: D
asked 18/09/2024
J Von
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first