03- Penetration Testing Quiz Flashcards
Find the wrong statement about penetration testing.
A. It is an unintentional attack
B. Pen-testing is used for security assessment
C. Pen testing improves the security of the system
D. Pen testing does discovers security weaknesses
Answer: A
A pentest is an intentional attack on a system using the pen testing skills to improve the defense strategy.
Which stage does not verify or try to exploit the vulnerability, just lists and ranks the identified
weaknesses.
C. Vulnerability assessment
D. Vulnerability scan
Answer: B
Vulnerability scan is the next step after the first discovery. This stage does not verify or try to exploit the vulnerability, it just
lists and ranks the identified weaknesses.
Penetration testing
a. can evaluate the security of system or network
b. cannot be used to identify the vulnerabilities left undetected by automated vulnerability
scanners
c. is an unauthorized attempt to exploit a computer system
d.. determines the critical vulnerabilities
Answer: A and D
Penetration testing exploits the vulnerabilities of a system or network to improve the security of the system. Pentesting can
identify the insecure areas of the system or network that can be used by an attacker to gain unauthorized access to the system.
Nexpose and GFI are tools that try to match conditions found on the target system with known
vulnerabilities, and can find new vulnerabilities.
True
False
Answer: False
Nexpose, Nessus and GFI are tools that try to match conditions found on the target system with known vulnerabilities, but they
lack the ability to find new vulnerabilities. These tools count on a database to identify the existence of certain weaknesses.
A vulnerability scan tries to verify the vulnerabilities found with little or no user interaction.
True
False
Answer: False
The last phase, or vulnerability assessment, tries to verify the vulnerabilities found and is done with little or no user interaction.
Question 1 Which step is essential for the organization to be compliant with certain ISOs or other certification bodies? A. Security audit B. Vulnerability assessment C. Code reviews
Answer: C
It can analyze specific web applications or internal software. It is the essential step for the organization to be compliant with
certain ISOs or other certification bodies.
______ testing aims to exploit identified vulnerabilities to check what information is exposed to the
outside world.
Internal
External
Answer: B
External testing aims to exploit identified vulnerabilities to check what information is exposed to the outside world.
What remains the same in both internal and external testing?
A. The target
B. The attacker
Answer: A
The target remains the same in both the internal and external testing.
Which attack can be much more devastating?
A. External attacks
B. Internal attacks
Answer: B
Internal attackers have the full understanding of which systems are important within a network and where it is located.
__________ saves time and resources, but is not accurate or professional.
A. Automated pentesting
B. Manual testing
Answer: A
You can easily use different tools to automate pentesting, to save your time and resources, but it is not accurate or
professional.
Manual testing requires: A. less planning B. a schedule C. an attack design D. automated tools
Answer: B and C
A skilled manual tester will always plan and schedule everything in advance. An experienced pen tester will always prepare an
attack design and schedule it.
Identify the benefits of using automated tools. A. Faster B. Computerized C. Accurate D. In-depth coverage
Answer: A and B
The testing carried out with automated tools is faster when compared to manual ones. Automated tools are fully computerized,
whereas manual testing depends entirely on the skill of the tester.
Identify the disadvantages of using automated tools. A. Fast B. Dependency on the vendor’s database C. Only tests technical flow D. Computerized
Answer: B and C
Automated tools work based on the information provided in the database, and the decreased chances of being updated to the
latest threats affects the efficiency of the test. The automated testing only tests the technical flow, whereas the manual testing
tests for both technical and business/logic flow.
What are the disadvantages of manual testing?
A. Awareness to new attack vendors
B. Tests for both technical and business/logic flow
C. Does not cover the entire system
D. Slow
Answer: C and D
Only automated testing is able to cover every bit of the system, whereas the manual testing fails to do so. The manual testing is
slow when compared to automated testing.
Pick out the merits of manual testing. A. Dependency on the skill of the tester B. Accuracy C. Possibility of forgetting D. Familiarity with new threats
Answer: B and D
The automated tools lack accuracy. The automated tools depend on the database of the vendor, which may not be updated.
Pen testers will use _____ to protect the possibility of data leakage and add another layer of security.
A. code review
B. vulnerability scan
C. manual testing
Answer: A
Code review can be used to identify the vulnerabilities left by developers, thereby protecting the possibility of data leakage and
adding another layer of security.
Identify the least effective technique to protect webapps.
A. Basic SQL injection
B. Blind SQL injection
Answer: A
Hackers have developed new techniques to overcome the basic SQL injection techniques.
Pentesting tests helps an organization to do the following except:
A. Manage vulnerabilities
B. Avoid downtime
C. Preserve the corporation’s good reputation
D. Manage risks
Answer: D
Pen testers are only concerned with security issues and improving the defense strategy.
The risk assessment depends heavily on the vulnerability assessment.
True
False
Answer: True
The risk assessment depends heavily on the vulnerability assessment and cannot be performed without identifying the
vulnerabilities on a system.
Penetration testing aims to determine the impact on the business if an attack was successful.
True
False
Answer: True
Penetration testing simulates a real-time attack and determines the impact on the business if an attack was successful.
External testing simulates what an insider attack could accomplish.
True
False
Answer: False
Internal testing simulates what an insider attack could accomplish, while an external test exploits vulnerabilities to identify
information that will be exposed to the outside world.
Armitage is a guru in automated testing, liked by all pen testers.
True
False
Answer: False
Armitage is a plugin in Metasploit, which presents a manual framework, to automate the pentest. Core impact is a guru in
automated testing.
Automated testing is faster than manual testing.
True
False
Answer: True
Automated testing is faster. Manual testing requires planning, an attack design, and a schedule. It is exactly, in a way, what a
hacker does to attack certain environment.
Penetration testing is not complete without testing human behavior.
True
False
Answer: True
Penetration testing is not complete without testing human behavior, as exploiting human trust is the easiest way to gain access
to sensitive information.
If a hacker gains physical access to the system, he may not try to install malicious hardware like
keyloggers or backdoors.
True
False
Answer: False
If a hacker gains physical access to the system, he may try to install malicious hardware like keyloggers or backdoors.
In case of mobile users, the pentesting team will not attempt to enforce a policy to encrypt mobile
devices.
True
False
Answer: False
The pentesting team will try to enforce a policy to encrypt mobile devices to prevent the exposure of sensitive information.
Footprinting, services probing, and system fingerprinting are a few examples of internal testing.
True
False
Answer: False
Footprinting, services probing, and system fingerprinting are a few examples of tests that focus on external systems that face
the Internet.
Internal Network Scanning, Firewall and ACL Testing, and Password Strength Testing are a few
external threats.
True
False
Answer: True
Internal Network Scanning, Database Security Controls Testing, Firewall and ACL Testing, and Password Strength Testing are all
examples of external attacks.
SQL injection techniques cannot be used to find web application vulnerabilities.
True
False
Answer: False
SQL injection techniques can be used to find web application vulnerabilities. Basic SQL injection, advanced SQL injection, and
blind SQL injection techniques are the most common techniques used to ensure the safety of webapps.
Penetration testing can be used to evaluate the magnitude of potential business and operational
impacts of successful attacks.
True
False
Answer: True
Penetration testing can identify the vulnerabilities left out by automated tools. It can evaluate the magnitude of potential
business and operational impacts of successful attacks.
A security audit is also known as a security assessment.
True
False
Answer: True
A security audit is also known as a security review or assessment.