exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 30 discussion

Actual exam question from ISC's CSSLP
Question #: 30
Topic #: 1
[All CSSLP Questions]

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

  • A. Full operational test
  • B. Penetration test
  • C. Paper test
  • D. Walk-through test
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: B
A walk-through test is not typically used to circumvent security features of an information system. Rather, it is a type of static testing that is used to review the design and code of a system to identify any potential issues such as syntax errors, logical errors, or other issues that may arise. A walk-through test is used to identify and correct problems before the system is deployed or tested. In contrast, a penetration test is a type of dynamic testing where the tester attempts to exploit vulnerabilities and circumvent security features of an information system. The goal of a penetration test is to simulate an attack on a system to identify potential security weaknesses.
upvoted 1 times
...
anuradha1306
9 months, 2 weeks ago
Selected Answer: B
The testing methodology in which assessors use all available documentation, work under no constraints, and attempt to circumvent the security features of an information system is: B. Penetration test Penetration testing, also known as ethical hacking, involves simulating real-world attacks on an information system to identify vulnerabilities and assess its security posture. In this testing methodology, assessors have access to all available documentation, work without constraints, and attempt to exploit security weaknesses in the system.
upvoted 1 times
...
4e3rv21rq3vq2q
1 year, 8 months ago
Selected Answer: B
B. Penetration test
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago