CompTIA Pentest+ for Dummies Chapter 11 Prep Test Flashcards

1
Q
Which of the following are reasons to halt the pentest and communicate with stakeholders about the situation? (Choose Two)
A.Found ports open
B.Critical findings
C.Located running services
D.Additional wireless SSIDs in range
E.Indicators of prior compromise
A

B.Critical findings
E.Indicators of prior compromise

Explanation:
When you come across a critical finding that presents an immediate security issue or evidence of a previous security compromise, you should halt the pentest and consult with the stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are performing a pentest for Company XYZ.
While assessing the company web server, you notice evidence that the systems had been previously hacked.
What would you do?
A.Continue the pentest, but note the evidence to add to the report
B.Halt the pentest and discuss the findings with the stakeholder
C.Halt the pentest and discuss findings with the IT manager
D.Clean up the evidence and continue the pentest

A

B.Halt the pentest and discuss the findings with the stakeholder

Explanation:
When performing a pentest, if you comer across info that indicates a previous security compromise has occurred, you should halt the penetser and consult with the stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During the pentest you notice that the admin account on five out of eight server is using the same password.
What feedback would you give to the customer?
A.Set the same password in the remaining three servers
B.Reset the admin password for all eight servers to the same new password
C.Recommend a randomize credentials tool
D.Delete the admin account on the five servers

A

C.Recommend a randomize credentials tool

Explanation:
To reset all password to unique random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are performing a pentest for Company XYZ and are assessing the database used by the ecommerce site.
You notice that the database stores the customer name, address, logon name, and password in plain text within the database.
What would you recommend?
A.Encrypt the password
B.Encrypt the logon name
C.Encrypt the city
D.Encrypt the name

A

A.Encrypt the password

Explanation:
Be sure that any sensitive data stored in files or DB is encrypted such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What remediation step would you recommend to an organization that has a number of users storing and accessing company data in the cloud?
A.Single Factor Authentication
B.Dual Internet Line
C.Multifactor authentication
D.Use HTTP for more secure transmissions
A

C.Multifactor authentication

Explanation:
Multifactor authentication is when someone needs more than knowledge of a password to log on. For example, in most web-based applications and cloud-based environments, you can have a random code sent to your mobile device during the logon process. You would have to enter this random code after entering your username and password, and it ensures you are who you say you are by you needing the mobile device to log on each time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have tested a web application and determined it is vulnerable to a SQL injection attack,
What remediation step would you recommend? (CHOOSE TWO MF)
A.Input validation
B.Multifactor authentication
C.Parametrized queries
D.Use HTTPS
E.Use HTTP

A

A.Input validation
C.Parametrized queries

Explanation:
To prevent SQL injection attacks, you should sanitize the data input with validation code and also use parameterized queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After performing an assessment of Company XYZ, you have recommended a remediation step of system hardening.
Which of the following is an action performed during system hardening?
A.Implement multifactor authentication
B.Use HTTPS
C.Implement Input Validation
D.Disable Unnecessary Services

A

D.Disable Unnecessary Services

Explanation:
System hardening involves disabling unnecessary services and uninstalling unnecessary software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What part of the pentest report is to contain a high-level overview of the pentest and its findings for stakeholders to get a quick picture of the company's security posture?
A.Cover Page
B.Executive Summary
C.Methodology 
D.Conclusion
A

B.Executive Summary

Explanation:
The executive summary is written in non-technical terms so that management understands the testing that was performed and a summary of the results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of your pentesters has created the pentest report to deliver to the customer.
What recommendation would you give to the pentester before the report is sent to the customer?
A.Perform a spell check
B.Include all pentesters in the email message
C.ENcrypt the report
D.Store multiple copies of the report on backup media

A

C.ENcrypt the report

Explanation:
You should always encrypt the report in storage and in transit because the pentest report contains information that someone can use to hack the customer’s network and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have delivered and reviewed the pentest report with the customer.
You are now ready to perform post-engagement cleanup.
Which of the following is not an activity during post-engagement cleanup?
A.Remove shells
B.Remove tools
C.Remove tester-created credentials
D.Remove unnecessary services

A

D.Remove unnecessary services

Explanation:
Removing unnecessary services is a step for system hardening, not post-engagement cleanup. Post-engagement cleanup involves removing shells, tools, and user accounts placed on the target vsystems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly