(ISC)2(ISC)2
CAP · Question #69
CAP Question #69: Real Exam Question with Answer & Explanation
Sign in or unlock CAP to reveal the answer and full explanation for question #69. The question stem and answer options stay visible for context.
Assessment/Audit of Security and Privacy Controls
Question
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
Options
- AFull operational test
- BPenetration test
- CPaper test
- DWalk-through test
Unlock CAP to see the answer
You've previewed enough free CAP questions. Unlock CAP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Penetration Testing#Security Assessment#Testing Methodologies#Vulnerability Exploitation