CompTIA Pentest+ for Dummies Chapter 11 Prep Test Flashcards
Which of the following are reasons to halt the pentest and communicate with stakeholders about the situation? (Choose Two) A.Found ports open B.Critical findings C.Located running services D.Additional wireless SSIDs in range E.Indicators of prior compromise
B.Critical findings
E.Indicators of prior compromise
Explanation:
When you come across a critical finding that presents an immediate security issue or evidence of a previous security compromise, you should halt the pentest and consult with the stakeholder
You are performing a pentest for Company XYZ.
While assessing the company web server, you notice evidence that the systems had been previously hacked.
What would you do?
A.Continue the pentest, but note the evidence to add to the report
B.Halt the pentest and discuss the findings with the stakeholder
C.Halt the pentest and discuss findings with the IT manager
D.Clean up the evidence and continue the pentest
B.Halt the pentest and discuss the findings with the stakeholder
Explanation:
When performing a pentest, if you comer across info that indicates a previous security compromise has occurred, you should halt the penetser and consult with the stakeholders
During the pentest you notice that the admin account on five out of eight server is using the same password.
What feedback would you give to the customer?
A.Set the same password in the remaining three servers
B.Reset the admin password for all eight servers to the same new password
C.Recommend a randomize credentials tool
D.Delete the admin account on the five servers
C.Recommend a randomize credentials tool
Explanation:
To reset all password to unique random
You are performing a pentest for Company XYZ and are assessing the database used by the ecommerce site.
You notice that the database stores the customer name, address, logon name, and password in plain text within the database.
What would you recommend?
A.Encrypt the password
B.Encrypt the logon name
C.Encrypt the city
D.Encrypt the name
A.Encrypt the password
Explanation:
Be sure that any sensitive data stored in files or DB is encrypted such as passwords
What remediation step would you recommend to an organization that has a number of users storing and accessing company data in the cloud? A.Single Factor Authentication B.Dual Internet Line C.Multifactor authentication D.Use HTTP for more secure transmissions
C.Multifactor authentication
Explanation:
Multifactor authentication is when someone needs more than knowledge of a password to log on. For example, in most web-based applications and cloud-based environments, you can have a random code sent to your mobile device during the logon process. You would have to enter this random code after entering your username and password, and it ensures you are who you say you are by you needing the mobile device to log on each time.
You have tested a web application and determined it is vulnerable to a SQL injection attack,
What remediation step would you recommend? (CHOOSE TWO MF)
A.Input validation
B.Multifactor authentication
C.Parametrized queries
D.Use HTTPS
E.Use HTTP
A.Input validation
C.Parametrized queries
Explanation:
To prevent SQL injection attacks, you should sanitize the data input with validation code and also use parameterized queries.
After performing an assessment of Company XYZ, you have recommended a remediation step of system hardening.
Which of the following is an action performed during system hardening?
A.Implement multifactor authentication
B.Use HTTPS
C.Implement Input Validation
D.Disable Unnecessary Services
D.Disable Unnecessary Services
Explanation:
System hardening involves disabling unnecessary services and uninstalling unnecessary software.
What part of the pentest report is to contain a high-level overview of the pentest and its findings for stakeholders to get a quick picture of the company's security posture? A.Cover Page B.Executive Summary C.Methodology D.Conclusion
B.Executive Summary
Explanation:
The executive summary is written in non-technical terms so that management understands the testing that was performed and a summary of the results.
One of your pentesters has created the pentest report to deliver to the customer.
What recommendation would you give to the pentester before the report is sent to the customer?
A.Perform a spell check
B.Include all pentesters in the email message
C.ENcrypt the report
D.Store multiple copies of the report on backup media
C.ENcrypt the report
Explanation:
You should always encrypt the report in storage and in transit because the pentest report contains information that someone can use to hack the customer’s network and systems.
You have delivered and reviewed the pentest report with the customer.
You are now ready to perform post-engagement cleanup.
Which of the following is not an activity during post-engagement cleanup?
A.Remove shells
B.Remove tools
C.Remove tester-created credentials
D.Remove unnecessary services
D.Remove unnecessary services
Explanation:
Removing unnecessary services is a step for system hardening, not post-engagement cleanup. Post-engagement cleanup involves removing shells, tools, and user accounts placed on the target vsystems.