• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which two options are phases in the Information Systems Security Assessment Framework (ISSAF)? (Choose two.)

  • Pre-engagement interactions
  • Maintaining access
  • Reporting
  • Post-exploitation
  • Vulnerability identification

Explanation & Hints:

Information Systems Security Assessment Framework (ISSAF) is a penetration methodology with the following phases: Information gathering, Network mapping, Vulnerability identification, Penetration, Gaining access and privilege escalation, Enumerating further, Compromising remote users/sites, Maintaining access, and Covering the tracks.

For more Questions and Answers:

1.4.3 Quiz – Introduction to Ethical Hacking and Penetration Testing Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments