Which two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)

IT Questions BankCategory: Ethical HackerWhich two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)

Which two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)

  • Pre-engagement interactions
  • Maintaining access
  • Reporting
  • Post-exploitation
  • Vulnerability identification

Explanation: Information Systems Security Assessment Framework (ISSAF) is a penetration methodology with the following phases: Information gathering, Network mapping, Vulnerability identification, Penetration, Gaining access and privilege escalation, Enumerating further, Compromising remote users/sites, Maintaining access, and Covering the tracks.

Exam with this question: 1.4.3 Quiz - Introduction to Ethical Hacking and Penetration Testing Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments