ISC Certified Information Systems Security Professional (CISSP) CISSP Question # 151 Topic 16 Discussion
CISSP Exam Topic 16 Question 151 Discussion:
Question #: 151
Topic #: 16
Which of the following is the MOST important consideration in selecting a security testing method based on different Radio-Frequency Identification (RFID) vulnerability types?
A.
The performance and resource utilization of tools
B.
The quality of results and usability of tools
C.
An understanding of the attack surface
D.
Adaptability of testing tools to multiple technologies
The attack surface of an RFID system is the set of points where an attacker can interact with or influence the system. Different types of RFID vulnerabilities may affect different parts of the system, such as the tags, the readers, the middleware, or the backend database. Therefore, the most important consideration in selecting a security testing method based on different RFID vulnerability types is to have an understanding of the attack surface and the potential threats and risks associated with each part of the system. This will help to choose the most appropriate and effective testing method, such as passive or active scanning, tag cloning or spoofing, replay or relay attacks, or cryptographic analysis. References: Official (ISC)2 CISSP CBK Reference, Fifth Edition, Domain 6: Security Assessment and Testing, pp. 1055-1056; CISSP All-in-One Exam Guide, Eighth Edition, Chapter 10: Security Assessment and Testing, pp. 1039-1040.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit