nerdexam
(ISC)2(ISC)2

CISSP · Question #836

CISSP Question #836: Real Exam Question with Answer & Explanation

The correct answer is D: Exploits that can attack weaknesses. When planning a penetration test, the tester will be most interested in the exploits that can attack the weaknesses of the target system or network. Exploits are the techniques or tools that take advantage of the vulnerabilities to compromise the security or functionality of the

Submitted by yaw92· Mar 5, 2026Security Assessment and Testing

Question

When planning a penetration test, the tester will be MOST interested in which information?

Options

  • APlaces to install back doors
  • BThe main network access points
  • CJob application handouts and tours
  • DExploits that can attack weaknesses

Explanation

When planning a penetration test, the tester will be most interested in the exploits that can attack the weaknesses of the target system or network. Exploits are the techniques or tools that take advantage of the vulnerabilities to compromise the security or functionality of the system or network. The tester will use the exploits to simulate a real attack and test the effectiveness of the security controls and defenses.

Topics

#penetration testing#exploits#vulnerabilities#attack vectors

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions