Free CAP Exam Braindumps (page: 13)

Page 12 of 99

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit.
Which of the following areas can be exploited in a penetration test?
Each correct answer represents a complete solution. Choose all that apply.

  1. Social engineering
  2. File and directory permissions
  3. Buffer overflows
  4. Kernel flaws
  5. Race conditions
  6. Information system architectures
  7. Trojan horses

Answer(s): A,B,C,D,E,G



Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team.
What document is Frank and the NHH Project team creating in this scenario?

  1. Project management plan
  2. Resource management plan
  3. Risk management plan
  4. Project plan

Answer(s): C



In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

  1. Full operational test
  2. Walk-through test
  3. Penetration test
  4. Paper test

Answer(s): C



Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?

  1. Phase 4
  2. Phase 3
  3. Phase 2
  4. Phase 1

Answer(s): B






Post your Comments and Discuss ISC CAP exam with other Community members:

CAP Exam Discussions & Posts