Register
34:59
Stop
CISA - Protection of Information Assets - Information Asset Security and Control - Physical and Environmental Controls
Intermediate
1/35
Which approach best characterizes an ethical hacking assessment in information security auditing?
a.
Performing security testing after a breach has occurred to determine the exact entry points that were compromised by attackers
b.
Conducting automated vulnerability scans followed by comprehensive technical documentation of all system weaknesses regardless of exploitation potential
c.
Evaluating an organization's security policies and compliance documentation against regulatory frameworks through desktop reviews
d.
Simulating cyberattacks with authorization to identify vulnerabilities before malicious actors
Intermediate