CIW Exam Questions

What is the name of the risk assessment stage in which you bypass login accounts and passwords?

What is the name of the risk assessment stage in which you bypass login accounts and passwords?

A.
Penetration

B.
Control

C.
Activation

D.
Discovery

Explanation:
In Penetration, all access controls (including login accounts and passwords) are bypassed.
Incorrect Answers:
B: Control is the stage where you show that you can control the resource, and show the methods that can be used to ensure prevention.
C: Activation is not a risk assessment stage.
D: Discovery is the task of testing the network security for effectiveness and locating weaknesses.