1. Which of the following choices best defines the term -risk appetite with regard to information security?
A) The ability of an organization to survive the effects of any situations or events affecting its business assets, such as computer systems or networks adversely
B) An organization-s acceptance and understanding of the likelihood and the influence of a specific threat on its networks or systems
C) If a penetration test is a financially supported by business expense, a key factor helps an organization.
D) In the information systems environment of an organization, the amount of risk an organization is willing to accept
2. For the handling of a penetration test report, which one of the following is a reasonable, and secure method?
A) The file is encrypted using DES, as detailed in your statement of work, sent to the declared recipients, and also a secondary communication channel is determined that assists to send the decryption password (if it was not declared in the SOW previously)
B) The file is sent through an E-mail in a plaintext format
C) The file is encrypted with AES-256, the declared recipients are provided with it as detailed in statement of your work, and a secondary communication channel is determined through which the decryption password is sent (if it was not declared in the SOW previously)
D) The file is encrypted with AES-256, being uploaded to a repository of reports that are publicly viewable and written by your organization, and a secondary channel is determined through which the decryption password is sent (if it was not declared in the SOW previously)
3. The broad, strategic information about testing techniques and practices, the decision-making processes guiding analysis, information collection, and risk evaluation are detailed in which section of a penetration test report?
A) Risk Ratings
B) Methodology
C) Appendixes
D) Executive Summary
4. A normalized and standardized representation of discovered vulnerabilities and the overall threat presented to an affected network or system are aimed to be provided by which element of a penetration test report?
A) Appendixes
B) Severity Rating of Vulnerability
C) Executive Summary
D) Methodology
5. Communicating with the client point of contact during a penetration test is to provide resolution, if a system or service is brought down during testing, both legitimate users and further testing is left unavailable. Which is the best describing term for this concept?
A) Remediation
B) Collision Detection
C) Retesting
D) De-escalation
Leave a comment