Which two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)
- Pre-engagement interactions
- Maintaining access
- Reporting
- Post-exploitation
- Vulnerability identification
Explanation & Hints: Information Systems Security Assessment Framework (ISSAF) is a penetration methodology with the following phases: Information gathering, Network mapping, Vulnerability identification, Penetration, Gaining access and privilege escalation, Enumerating further, Compromising remote users/sites, Maintaining access, and Covering the tracks. |