Page 1120 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1120

D.  80

                9.  Which one of the following tests provides the most accurate and
                    detailed information about the security state of a server?


                    A.  Unauthenticated scan

                    B.  Port scan

                    C.  Half-open scan

                    D.  Authenticated scan

              10.  What type of network discovery scan only follows the first two
                    steps of the TCP handshake?

                    A.  TCP connect scan

                    B.  Xmas scan

                    C.  TCP SYN scan

                    D.  TCP ACK scan


               11.  Matthew would like to test systems on his network for SQL
                    injection vulnerabilities. Which one of the following tools would be
                    best suited to this task?

                    A.  Port scanner

                    B.  Network vulnerability scanner

                    C.  Network discovery scanner

                    D.  Web vulnerability scanner

               12.  Badin Industries runs a web application that processes e-

                    commerce orders and handles credit card transactions. As such, it
                    is subject to the Payment Card Industry Data Security Standard
                    (PCI DSS). The company recently performed a web vulnerability
                    scan of the application and it had no unsatisfactory findings. How
                    often must Badin rescan the application?

                    A.  Only if the application changes

                    B.  At least monthly


                    C.  At least annually
   1115   1116   1117   1118   1119   1120   1121   1122   1123   1124   1125