Problem 1: How the phases of compromise that an attacker will take align with the PEN testers methodology, goals and objectives of each phase when evaluating.
Problem 2: Take a stand, either pro or con: should all phases of the PEN Testers be included in the scope when conducting phase testing? Include supporting evidence for each phase.
Problem3: What motivate an organization to perform penetration testing cyber operations?
Problem 4: Where the use of flaw hypothesis methodology would intersect with the PEN testers methodology. How could other methodologies such as OSSTMM affect the PEN tester's methodology steps?