62.0k views
1 vote
Which of the following are likely to be found within a penetration test rules of engagement (ROE)?

1) What methods of attack are legitimate
2) The appropriate length and complexity of employee passwords
3) What systems may be targeted
4) How long CCTV camera recordings should be maintained

1 Answer

4 votes

Final answer:

The penetration test rules of engagement (ROE) should include details on legitimate methods of attack and the specific systems that may be targeted.

Step-by-step explanation:

The rules of engagement (ROE) for a penetration test outline the boundaries and guidelines under which the test is conducted. 1) What methods of attack are legitimate would specify which tactics, techniques, and procedures (TTPs) the pen testers are allowed to utilize against the target environment. As for 3) What systems may be targeted, ROE should clearly outline the scope of the assessment, detailing which systems, networks, and applications are within the purview of the pen test. However, items such as 2) The appropriate length and complexity of employee passwords and 4) How long CCTV camera recordings should be maintained are typically not found in a penetration test ROE. These items are related to a company's internal policies rather than to a penetration test agreement, which focuses on the technical and procedural aspects of the test itself.

Hackers employ a variety of tactics, including phishing, malware, and exploiting vulnerabilities to access systems and data. They commonly steal sensitive information, financial data, intellectual property, and personal details. This information may be used for monetary gain, identity theft, corporate espionage, or even sold in black markets. To reduce or stop hacking, organizations implement robust security measures like firewalls, intrusion detection/prevention systems, regular security audits, employee training, and keeping systems up to date.

User Rafawhs
by
7.1k points