Valid CISA Dumps shared by ExamDiscuss.com for Helping Passing CISA Exam! ExamDiscuss.com now offer the newest CISA exam dumps, the ExamDiscuss.com CISA exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CISA dumps with Test Engine here:
During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?
Correct Answer: B
Comprehensive and Detailed Step-by-Step Explanation: Exploitationis the phase where testersleverage identified vulnerabilitiestogain unauthorized accessto systems. * Exploitation (Correct Answer - B) * Attackers use techniques such as SQL injection, buffer overflow, or privilege escalation. * Example:A tester exploits a weak password to gain admin access. * Exfiltration (Incorrect - A) * The process of stealing dataaftergaining access. * Reconnaissance (Incorrect - C) * The initial stage where attackers gather information about the target. * Scanning (Incorrect - D) * Involves identifying open ports and services but does not involve actual attacks. References: * ISACA CISA Review Manual * NIST 800-115 (Technical Guide to Security Testing)