Chapter 2 Flashcards
What term describes a document created to define project-specific activities, deliverables, and
timelines based on an existing contract?
C. SOW ( Statement of work)
MSA (master services agreement) contract reached between parties, in which the parties agree to most of the terms that will govern future transactions or future agreements.
Maria wants to build a penetration testing process for her organization and intends to
start with an existing standard or methodology.
Which of the following is not suitable for
that purpose?
A. ISSAF
B. OSSTM
C. PTES
D. ATT&CK
D. ATT&CK (Describes adversary tactics)
Which of the following types of penetration test would provide testers with complete visibility into the configuration of a web server without having to compromise the server to gain
that information?
A. Unknown environment
B. Partial knowledge
C. Known environment
D. Zero knowledge
C. Known environment
During a penetration test scoping discussion, Charles is asked to test the organization’s SaaSbased email system.
What concern should he bring up?
A. Cloud-based systems require more time and effort.
B. Determining the scope will be difficult due to the size of cloud-hosted environments.
C. Cloud service providers do not typically allow testing of their services.
D. Testing cloud services is illegal.
C. Cloud service providers do not typically allow testing of their services.
(Large environment that will take awhile to scope)
What type of legal agreement typically covers sensitive data and information that a penetration tester may encounter while performing an assessment?
B. An NDA
What does an MSA typically include?
A. The terms that will govern future agreements
During a penetration test, Alex discovers that he is unable to scan a server that he was able to
successfully scan earlier in the day from the same IP address. What has most likely happened?
A. His IP address was whitelisted.
B. The server crashed.
C. The network is down.
D. His IP address was blacklisted.
D. His IP address was blacklisted.
While performing an on-site penetration test, Cassandra plugs her laptop into an accessible
network jack. When she attempts to connect, however, she does not receive an IP address and
gets no network connectivity. She knows that the port was working previously. What technology has her target most likely deployed?
C. NAC
(Network Access Control) she is unable to access the network until her system is approved.
What type of penetration test is not aimed at identifying as many vulnerabilities as possible
and instead focuses on vulnerabilities that specifically align with the goals of gaining control
of specific systems or data?
An objectives-based assessment
During an on-site penetration test, what scoping element is critical for wireless assessments
when working in shared buildings?
C. SSIDs (Penning the wrong network could cause legal or criminal repercussions)
Ruchika has been asked to conduct a penetration test against internal business systems at a
mid-sized company that operates only during a normal day shift. The test will be run against
critical business systems.
What restriction is most likely to be appropriate for the testing?
A. Time of day
During a penetration test specifically scoped to a single web application, Chris discovers that
the web server also contains a list of passwords to other servers at the target location. After
he notifies the client, they ask him to use them to validate those servers, and he proceeds to
test those passwords against the other servers. What has occurred?
C. Scope creep
(additional items are added to the scope of the assessment)
Lucas has been hired to conduct a penetration test of an organization that processes credit
cards. His work will follow the recommendations of the PCI DSS. What type of assessment is
Lucas conducting?
D. A compliance-based assessment
The penetration testing agreement document that Greg asks his clients to sign includes a
statement that the assessment is valid only at the point in time at which it occurs. Why does
he include this language?
A. His testing may create changes.
B. The environment is unlikely to be the same in the future.
C. Attackers may use the same flaws to change the environment.
D. The test will not be fully comprehensive.
B. The environment is unlikely to be the same in the future.
The company that Ian is performing a penetration test for uses a wired network for their
secure systems and does not connect it to their wireless network.
What environmental
consideration should Ian note if he is conducting a partial knowledge penetration test?
A. He needs to know the IP ranges in use for the secure network.
B. He needs to know the SSIDs of any wireless networks.
C. Physical access to the network may be required.
D. Physical access a nearby building may be required.
C. Physical access to the network may be required.