Which two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)
- Pre-engagement interactions
- Maintaining access
- Reporting
- Post-exploitation
- Vulnerability identification
Explanation: Information Systems Security Assessment Framework (ISSAF) is a penetration methodology with the following phases: Information gathering, Network mapping, Vulnerability identification, Penetration, Gaining access and privilege escalation, Enumerating further, Compromising remote users/sites, Maintaining access, and Covering the tracks.
Exam with this question: 1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing Answers
Please login or Register to submit your answer