ExamGecko
Question list
Search
Search

Question 325 - CISM discussion

Report
Export

Which of the following is the MOST important issue in a penetration test?

A.
Having an independent group perform the test
Answers
A.
Having an independent group perform the test
B.
Obtaining permission from audit
Answers
B.
Obtaining permission from audit
C.
Performing the test without the benefit of any insider knowledge
Answers
C.
Performing the test without the benefit of any insider knowledge
D.
Having a defined goal as well as success and failure criteria
Answers
D.
Having a defined goal as well as success and failure criteria
Suggested answer: D

Explanation:

The most important issue in a penetration test is having a defined goal as well as success and failure criteria. A penetration test is a simulated cyber attack against a computer system or an application to check for exploitable vulnerabilities. The goal of a penetration test is to identify and evaluate the security risks and weaknesses of the target system or application, and to provide recommendations for improvement. The success and failure criteria of a penetration test are the metrics and indicators that measure the effectiveness and efficiency of the test, and the extent to which the test achieves its goal. By having a defined goal as well as success and failure criteria, the penetration tester can plan and execute the test in a systematic and structured manner, and can communicate and report the results and findings in a clear and concise way. The other options are not the most important issue in a penetration test, although they may be some factors or considerations that affect the test. Having an independent group perform the test is a desirable practice, as it can provide an unbiased and objective assessment of the target system or application. However, it is not essential, as long as the penetration tester follows ethical hacking principles and standards. Obtaining permission from audit is a mandatory requirement, as it ensures that the penetration test is authorized and compliant with the organization's policies and regulations. However, it is not an issue, as it is a prerequisite for conducting the test. Performing the test without the benefit of any insider knowledge is an optional approach, as it simulates a real-world attack by an external hacker who does not have access to the internal design or configuration of the target system or application. However, it is not always feasible or effective, as some vulnerabilities may be hidden or inaccessible from an outsider's perspective.

asked 01/10/2024
Edwin Daneel
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first