2.3.4 Practice Questions Flashcards

1
Q

Which of the following documents details exactly what can be tested during a penetration test?

answer

Non-Disclosure Agreement

Master Service Agreement

Rules of Engagement

Scope of Work

A

Scope of Work

Explanation
The scope of work is a very detailed document that defines exactly what software, and hardware, test types, and facility features are going to be included in the penetration test. This document is also referred to as the statement of work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After performing a risk assessment, an organization must decide what areas of operation can be included in a penetration test and what areas cannot be included. Which of the following describes the process?

answer

Avoidance

Transference

Mitigation

Tolerance

A

Tolerance

Explanation
After a risk assessment is performed and vulnerable areas identified, the organization needs to decide their tolerance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. network. Which of the following types of penetration tests is being performed?

Black Box

Internal

External

Gray Bo

A

Internal

Explanation
An internal test will focus on any systems that logically resides behind the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Miguel is performing a penetration test on a web server. Miguel was given only the server’s IP address and name. Which of the following best describes the type of penetration test Miguel is performing?

answer

White box

External

Internal

Black box

A

External

Explanation
An external test focuses on any publicly facing system, such as a web server that resides in the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following elements is generally considered the weakest link in an organization’s security?

answer

Servers

Human

Network

Physical

A

Human

Explanation
It is commonly accepted that the weakest link in any security model is the human element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes social engineering?

answer

The art of deceiving and manipulating others into doing what you want.

The process of analyzing an organization’s security and locating security holes.

Sending an email that appears to be from a bank to trick the target into entering their credentials on a malicious website.

A stealthy computer network attack in which a person or group gains unauthorized access for an extended period.

A

The art of deceiving and manipulating others into doing what you want.

Explanation
Social engineering is the art of deceiving and manipulating others into doing what you want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is considered a mission-critical application?

answer

Customer database

Support log

Medical database

Video player

A

Medical database

Explanation
Some applications are considered mission-critical and need to be off-limits to avoid any down time. This can include financial processing, medical databases, or other sensitive applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does an organization do to identify areas of vulnerability within their network and security systems?

answer

Risk assessment

Scanning

External test

Internal test

A

Risk assessment

Explanation
The purpose of a risk assessment is to identify areas of vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops. What method of dealing with risk is the organization using?

answer

Transference

Mitigation

Avoidance

Acceptance

A

Avoidance

Explanation
When you identify a risk you can avoid, you should avoid it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following formula defines which method of dealing with risk?

Cost of Risk > Damage = Risk _________

answer

Mitigation

Transference

Avoidance

Acceptance

A

Acceptance

Explanation
Risk acceptance occurs when the organization determines that the cost and effort to mitigate a risk outweighs the risk’s potential damage, so they simply accept the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a consideration when scheduling a penetration test?

answer

Are there any security exceptions?

Who is aware of the test?

What risks are acceptable?

Which systems are being tested?

A

Who is aware of the test?

Explanation
The rules of engagement must specify who is aware of the penetration test and its time frame. The less people who know, the more realistic the test will be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A client asking for small deviations from the scope of work is called:

answer

Change order

Scope creep

Security exception

Rules of engagement

A

Scope creep

Explanation
This is when the client begins asking for small deviations from the scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Heather is in the middle of performing a penetration test when her client asks her to also check the security of an additional server. Which of the following documents does she need to submit before performing the additional task?

answer

Change order

Permission to test

Scope of work

Rules of engagement

A

Change order

Explanation
When a change to the scope of work is requested, a change order should be filled out and agreed on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a deviation from standard operating security protocols?

answer

MAC filtering

Blacklisting

Whitelisting

Security exception

A

Security exception

Explanation
A security exception is any deviation from standard operating security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Miguel is performing a penetration test. His client needs to add Miguel’s computer to the list of devices allowed to connect to the network. What type of security exception is this?

answer

Black box

White box

Blacklisting

Whitelisting

A

Whitelisting

Explanation
If a device is whitelisted, then traffic coming from it will be allowed through the IPS, Firewall, or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly