A company hires a cybersecurity consultant to assess vulnerability on crucial web application devices such as web and database servers. Which document should the company provide to help the consultant document and define what systems are in the testing?

IT Questions BankCategory: Ethical HackerA company hires a cybersecurity consultant to assess vulnerability on crucial web application devices such as web and database servers. Which document should the company provide to help the consultant document and define what systems are in the testing?

A company hires a cybersecurity consultant to assess vulnerability on crucial web application devices such as web and database servers. Which document should the company provide to help the consultant document and define what systems are in the testing?

  • examples of application requests
  • source codes of the applications
  • system and network architectural diagram
  • software development kit (SDK) for specific applications

Explanation: The system and network architectural diagrams can be very beneficial for penetration testers to help them to document and define what systems are in scope during the testing.

Exam with this question: 2.4.3 Quiz - Planning and Scoping a Penetration Testing Assessment Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x