adplus-dvertising
frame-decoration

Question

Ken is planning to conduct a vulnerability scan of an organization as part of a penetration test. He is conducting a black-box test. When would it be appropriate to conduct an internal scan of the network?

a.

During the planning stage of the test

b.

As soon as the contract is signed

c.

After receiving permission from an administrator

d.

After compromising an internal host

Answer: (d).After compromising an internal host Explanation:Because this is a black-box scan, Ken should not (and most likely cannot) conduct an internal scan until he first compromises an internal host. Once he gains this foothold on the network, he can use that compromised system as the launching point for internal scans.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Ken is planning to conduct a vulnerability scan of an organization as part of a penetration test. He is conducting a black-box test. When would it be appropriate to conduct an...

Similar Questions

Discover Related MCQs

Q. Which type of organization is the most likely to be impacted by a law requiring them to conduct vulnerability scans?

Q. Which one of the following categories of systems is most likely to be disrupted during a vulnerability scan?

Q. What term describes an organization’s willingness to tolerate risk in their computing environment?

Q. Which one of the following factors is least likely to impact vulnerability scanning schedules?

Q. Adam is conducting a penetration test of an organization and is reviewing the source code of an application for vulnerabilities. What type of code testing is Adam conducting?

Q. Ryan is planning to conduct a vulnerability scan of a business-critical system using dangerous plug-ins. What would be the best approach for the initial scan?

Q. Which one of the following activities is not part of the vulnerability management life cycle?

Q. What approach to vulnerability scanning incorporates information from agents running on the target servers?

Q. Brian is seeking to determine the appropriate impact categorization for a federal information system as he plans the vulnerability scanning controls for that system. After consulting management, he discovers that the system contains information that, if disclosed improperly, would have a serious adverse impact on the organization. How should this system be categorized?

Q. Jessica is reading reports from vulnerability scans run by different parts of her organization using different products. She is responsible for assigning remediation resources and is having difficulty prioritizing issues from different sources. What SCAP component can help Jessica with this task?

Q. Sarah is conducting a penetration test and discovers a critical vulnerability in an application. What should she do next?