Exam CISA All QuestionsBrowse all questions from this exam
Question 387

Which of the following security assessment techniques attempts to exploit a system's open ports?

    Correct Answer: B

    Penetration testing is a security assessment technique that attempts to exploit a system's open ports. Its purpose is to identify vulnerabilities by actively attempting to exploit them, simulating the actions of an attacker. This can include testing for weaknesses in the configuration or vulnerabilities associated with the services running on those ports.

Discussion
MOHAMMADSALTIOption: C

It is c as network scanning is one phase of penetration testing

3008Option: C

'network scanning' is first hacking tech, and second 'Vulnerability scanning' is going tech

zebreeOption: B

"Network scanning" is not the technique that attempts to exploit a system's open ports. The technique that attempts to exploit a system's open ports is "Penetration testing".

Forever25Option: B

Can someone explain why the correct answer is B? Network scanning doesn`t exploits ports, it just identifies them. Pentest is using for exploiting

shalota2Option: B

Network Scanning is the part of Penetration Testing. Gathering information like open ports, service running on these ports and much more but is not used for exploits. So I think the answer here is A. Penetration Testing is that type of testing when you try to exploits the vulnerabilities such as common open ports.

starzuuOption: B

"exploit" is the key word here.

PakawatOption: B

Pen Test

peeluOption: B

B. Penetration testing

JulianleehkOption: B

should be B