exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 2 question 73 discussion

Actual exam question from ISC's CSSLP
Question #: 73
Topic #: 2
[All CSSLP Questions]

Which of the following are the scanning methods used in penetration testing? Each correct answer represents a complete solution. Choose all that apply.

  • A. Vulnerability
  • B. Port
  • C. Services
  • D. Network
Show Suggested Answer Hide Answer
Suggested Answer: responding hosts on the network and their corresponding IP addresses. Answer: C is incorrect. This option comes under vulnerability scanning. 🗳️
The vulnerability, port, and network scanning tools are used in penetration testing. Vulnerability scanning is a process in which a Penetration Tester uses various tools to assess computers, computer systems, networks or applications for weaknesses. There are a number of types of vulnerability scanners available today, distinguished from one another by a focus on particular targets. While functionality varies between different types of vulnerability scanners, they share a common, core purpose of enumerating the vulnerabilities present in one or more targets. Vulnerability scanners are a core technology component of
Vulnerability management. Port scanning is the first basic step to get the details of open ports on the target system. Port scanning is used to find a hackable server with a hole or vulnerability. A port is a medium of communication between two computers. Every service on a host is identified by a unique 16-bit number called a port. A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by hackers to identify running services on a host with the view to compromising it. Port scanning is used to find the open ports, so that it is possible to search exploits related to that service and application. Network scanning is a penetration testing activity in which a penetration tester or an attacker identifies active hosts on a network, either to attack them or to perform security assessment. A penetration tester uses various tools to identify all the live or

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: AB
Options A and B are correct because vulnerability scanning and port scanning are two of the standard methods that can be used in penetration testing. Option C, i.e., services scanning, is not a standard method of pen-testing. However, it could still be a legitimate part of some specific types of assessment engagements depending on the project requirements. Option D, i.e., network scanning is also not explicitly mentioned as one of the standard techniques used for penetration testing. However, network mapping or discovery may be part of other stages of hacking and security auditing processes such as reconnaissance or intelligence gathering. Vulnerability scans and port scans during Penetration Testing use automated tools to detect potential weaknesses being tested area good practice but services and network scans are context-dependent methods that might vary depending upon specific project requirements.
upvoted 1 times
74gjd_37
5 months, 2 weeks ago
Penetration testing is a methodology to assess the security of an application or network by simulating attacks from malicious entities. Scanning is one of the stages in penetration testing which can help identify potential vulnerabilities and entry points for attackers. Some of the scanning methods used in penetration testing include vulnerability and port scanning. Vulnerability scanning involves automated tools that scan for known vulnerabilities within your systems, applications, and devices. Port scanning detects open ports on target systems to help identify potential access points into a network. It's important to note that while these methods are useful for detecting potential weaknesses, they should be considered one component of a comprehensive security assessment strategy that also includes manual analysis, social engineering tests, and other techniques as appropriate based on the threat model being examined.
upvoted 1 times
74gjd_37
5 months, 2 weeks ago
The term "network scanning" is not explicitly mentioned in the official ISC2 materials, in the respective chapters and pages about Penetration Testing. However, some of the techniques and tools associated with network mapping or discovery are covered within the broader scope of reconnaissance - one of the five core pen-testing stages according to NIST SP800-115. Moreover, depending on the organization's specific requirements and goals for a penetration testing project, network scanning may be included under other distinct headings such as host profiling or protocol analysis.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago