8. Penetration Testing and Exercises Flashcards

1
Q

Gathering Information

Penetration testing

A

Initial phase of penetration testing where attackers collect information about the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rules of Engagement (ROE)

Penetration testing

A

Formal document specifying the scope and permitted techniques for a penetration test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

White-Box, Black-Box, Grey-Box Testing

Penetration testing

A

Different approaches in penetration testing based on the level of knowledge the attacker has about the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discovery Phase

Penetration testing

A

Involves active and passive reconnaissance to identify potential vulnerabilities and attack paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack Phase

Penetration testing

A

The stage where penetration testers attempt to gain access to the target system and escalate privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lateral Movement

Penetration testing

A

The process of browsing through a network to find new systems and expand the attacker’s reach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pivoting

Penetration testing

A

A technique used in penetration testing where testers leverage a compromised system to attack other systems on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Persistence

Penetration testing

A

The practice of installing backdoors to maintain access to a system even after vulnerabilities are patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cleanup and Restoration

Penetration testing

A

The final phase of a penetration test, involving the removal of traces of the attack and restoring systems to their original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bug bounty program

Bug bounty

A

A formal process that encourages security researchers to responsibly report vulnerabilities in exchange for rewards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Controlled environment

Bug bounty

A

A secure setting where organizations open their systems to inspection by researchers as part of bug bounty programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automated scanning tools

Bug bounty

A

Programs used by opportunistic attackers to search for vulnerable systems on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Channeling attacker efforts

Bug bounty

A

Directing the skills of attackers towards identifying and reporting vulnerabilities through bug bounty programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vendor assistance

Bug bounty

A

Specialized vendors who help design, implement, and operate bug bounty programs for organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Validating vulnerability reports

Bug bounty

A

The process of verifying the accuracy and severity of reported vulnerabilities in bug bounty programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defense posture enhancement

Bug bounty

A

Increasing the overall strength of an organization’s defensive capabilities through the existence of bug bounty programs.

17
Q

Uncovering unknown vulnerabilities

Bug bounty

A

The success of bug bounty programs in discovering previously unidentified security weaknesses in organizations’ systems.