CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 362


Which of the following security testing techniques is MOST effective in discovering unknown malicious attacks?

Show Answer
Correct Answer: A

Penetration testing is a security testing technique that simulates real-world cyberattacks to identify vulnerabilities and weaknesses in an organization's systems, networks, or applications. This method is particularly effective in discovering unknown malicious attacks as it involves the testing of systems using the same techniques that an actual attacker would use. Unlike other methods, penetration testing can reveal new vulnerabilities that have not been previously documented.

Discussion

9 comments
Sign in to comment
MunaMOption: A
Sep 6, 2022

I think answer should be A because of unknown

MohamedAbdelaalOption: B
Apr 16, 2023

Using a sandbox for advanced malware detection provides another layer of protection against new security threats—zero-day (previously unseen) malware and stealthy attacks, in particular. And what happens in the sandbox, stays in the sandbox—avoiding system failures and keeping software vulnerabilities from spreading.

3008Option: A
Jun 25, 2023

Sandboxing is a security technique that isolates an application or process from the rest of the system, preventing it from accessing or modifying other resources. It is not a type of security testing, but rather a security mechanism that can be used to protect a system from potentially malicious code or inputs. Sandboxing can be useful for testing applications in a safe environment, but it does not discover unknown malicious attacks by itself.

MOHAMMADSALTIOption: B
Jan 5, 2023

Sandboxing

oldmagicOption: A
Jun 27, 2023

Penetration testing is the security testing technique that is most effective in discovering unknown malicious attacks.

SwallowsOption: A
Jun 8, 2024

Penetration testing, also known as ethical hacking, involves simulating real-world cyberattacks to identify vulnerabilities and weaknesses in an organization's systems, networks, or applications. Penetration testers use various methods and tools to attempt to exploit vulnerabilities in the same way that malicious attackers would. While sandboxing (Option B) can be useful for isolating potentially malicious code or programs in a controlled environment to prevent harm to the system, it is not specifically designed to discover unknown malicious attacks. Sandbox environments are typically used to analyze and evaluate https://www.examtopics.com/exams/isaca/cisa/view/2/#the behavior of suspicious or unknown software in a safe manner.

BA27Option: A
Aug 29, 2023

A. Penetration testing

meelaanOption: B
Oct 3, 2023

pen test is for cheking vulnurability not attack. Sandbox is for attack.

JustCisaOption: A
Oct 29, 2023

unknown malicious attacks, should be A, because they are Unknown, vulnerability scanning it is known things