adplus-dvertising
frame-decoration

Question

What does NIST 800-115 set expectations about?

a.

Penetration testing methodologies

b.

Compliance with financial regulations

c.

Best practices in marketing

d.

Employee performance evaluations

Answer: (a).Penetration testing methodologies Explanation:NIST 800-115 sets expectations about penetration testing methodologies.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What does NIST 800-115 set expectations about?

Similar Questions

Discover Related MCQs

Q. What is emphasized as a critical part of penetration testing preparation?

Q. What do penetration testers need to determine about the test environment?

Q. What is emphasized as an important aspect of penetration test planning?

Q. What does target selection in penetration testing determine?

Q. What is an important consideration in target selection for unknown environment assessments?

Q. What legal concepts should penetration testers be familiar with in engagement contracts?

Q. What legal document protects the data and information involved in a penetration test?

Q. Why is awareness of the legal and regulatory environment important for penetration testers?

Q. What ensures coverage in the event of issues during a penetration test?

Q. What drives many penetration tests in terms of compliance?

Q. What understanding helps in better completing compliance assessments?

Q. What does compliance with standards like PCI DSS provide in penetration testing?

Q. What may influence how you conduct your assessment and the rules of engagement in compliance-based assessments?

Q. What term describes a document created to define project-specific activities, deliverables, and timelines based on an existing contract?

Q. Maria wants to build a penetration testing process for her organization and intends to start with an existing standard or methodology. Which of the following is not suitable for that purpose?

Q. Which of the following types of penetration test would provide testers with complete visibility into the configuration of a web server without having to compromise the server to gain that information?

Q. What type of legal agreement typically covers sensitive data and information that a penetration tester may encounter while performing an assessment?

Q. During a penetration test scoping discussion, Charles is asked to test the organization’s SaaS-based email system. What concern should he bring up?

Q. During a penetration test, Alex discovers that he is unable to scan a server that he was able to successfully scan earlier in the day from the same IP address. What has most likely happened?

Q. What does an MSA typically include?