Flashcards in “CompTIA PenTest+ Practice Test Chapter 5 Reporting and Communication (Sybex: Panek, Crystal, Tracy)”
You have just completed a penetration test for a client. During the test, you used a variety of different tools to collect data and conduct exploits. Now you need to aggregate all of the data generated by these tools into a format that is consistent, correlated, and readable. What is this process called?
A.Attestation of findings
B.Normalization of data
C.De-escalation
D.De-confliction
B.Normalization of data
Explanation:
When you normalize the data from a penetration test, you aggregate all the data generated by all of the different tools and processes you used during the test and format it such that it is consistent and correlated. The goal is to make it such that the client can read the aggregated data and understand what happened during the test and when.
You have just completed a penetration test for a client and are now creating a written report of your findings. You need to make sure the reader understands that you followed the PCI DSS standard while conducting the test. In which part of the report should you include this information?
A.Findings
B.Remediation
C.Metrics and Measures
D.Methodology
D.Methodology
Explanation:
The final report you write for a penetration test should include a section entitled Methodology. In this section, you describe the penetration testing methodology you used to conduct the test. In this scenario, this would be the appropriate place to indicate that the PCI DSS standard was followed to conduct the test.
One of the goals of communication between the tester and the client during a penetration test is to ensure that both parties clearly understand the current security state of the network. Which of the following terms best describes this shared understanding?
A.Situational awareness
B.De-escalation
C.De-confliction
D.Goal reprioritization
A.Situational awareness
Explanation;
Among other things, the term situational awareness refers to a state of shared understanding between the client and the tester regarding the security posture of the client’s network.
During a penetration test, the client organization’s network administrator discovers a distributed denial of service (DDoS) attack underway that is aimed at the company’s web server. The administrator calls the penetration tester to verify that the attack is part of the penetration test and not coming from a real attacker. What is this process called?
A.Normalization of data
B.Situational awareness
C.De-confliction
D.Goal reprioritization
C.De-confliction
Explanation:
The term de-confliction refers to the process of communicating between the client and the tester to determine whether an attack detected during a penetration test is coming from an authorized penetration tester or whether it is a real attack instigated by some third-party hacker.
During a penetration test, the client organization begins to receive complaints from customers indicating that the organization’s web server is very slow to respond or even crashes at times. The network administrator discovers a distributed denial of service (DDoS) attack underway that is aimed at the company’s web server. Sales are being lost, so the administrator calls the penetration tester and asks them to stop the attack. What is this communication path called?
A.Situational awareness
B.De-escalation
C.De-confliction
D.Goal reprioritization
B.De-escalation
Explanation:
The term de-escalation refers to the process of communicating between the client and the tester to cease exploits used during the penetration test because of the adverse effects they may be having on the network.
Your organization is conducting a black box penetration test for a client. There are five members on your penetration test team. During the test, you continuously communicate with the other members of the team via email and text messaging to ensure everyone knows what the others are doing. What is this process called?
A.Situational awareness
B.Metrics and measures
C.De-confliction
D.Normalization of data
A.Situational awareness
Explanation:
Among other things, the term situational awareness refers to a state of common understanding between all members of the penetration testing team to ensure that every team member is aware of what the others are doing.
Your organization is conducting a black box penetration test for a client. There are five members on your penetration test team. During the test, you continuously communicate with the other members of the team via email and text messaging to coordinate the timing of activities, including reconnaissance, enumeration, exploits, and so on. What is this process called?
A.Situational awareness
B.De-escalation
C.De-confliction
D.Normalization of data
A.Situational awareness
Explanation:
Among other things, the term situational awareness refers to a state of common understanding between all members of the penetration testing team to ensure that testing activities are coordinated to occur at the appropriate time.
During a penetration test, the client organization begins to receive complaints from remote workers indicating that the organization’s VPN is down. The network administrator discovers a local area network denial (LAND) attack underway that is aimed at the company’s VPN server at the edge of the network. The remote workers are unable to work, so the administrator calls the penetration tester and asks them to dial back the attack.
What is this communication path called?
A.Situational awareness
B.De-escalation
C.De-confliction
D.Goal reprioritization
B.De-escalation
Explanation:
The term de-escalation refers to the process of communicating between the client and the tester to dial back the intensity of exploits used during the penetration test because of the adverse effects they may be having on the network.
During a penetration test, the client organization’s network administrator discovers a teardrop attack underway that is aimed at the company’s perimeter router. The administrator calls the penetration tester to see whether the attack is part of the penetration test. What is this communication path called?
A.Situational awareness
B.Metrics and measures
C.De-confliction
D.Normalization of data
C.De-confliction
Explanation:
The term de-confliction refers to the process of communicating between the client and the tester to determine whether an attack detected during a penetration test is coming from an authorized penetration tester or whether it is a real attack instigated by some third-party hacker.
Your organization is conducting a black box penetration test for a client. There are three testers on your team. At the beginning of the process, you have a team meeting to plan how the test will be conducted, when certain activities will occur, and which team members will be responsible for performing specific tasks. What is this process called?
A.De-confliction
B.De-escalation
C.Situational awareness
D.Goal reprioritization
C.Situational awareness
Explanation:
Among other things, the term situational awareness refers to a state of common understanding between all members of the penetration testing team to ensure that testing activities are planned and coordinated to occur at the appropriate time.
During a penetration test, an individual is caught trying to piggyback into the client organization’s facility. The trespasser claims to be a penetration tester and insists on being released.
Prior to pressing criminal charges, a member of the client’s IT staff calls the penetration tester to determine whether the trespasser is really a member of the penetration testing team. What is this communication path called?
A.Goal reprioritization
B.De-confliction
C.Situational awareness
D.De-escalation
B.De-confliction
Explanation:
The term de-confliction refers to the process of communicating between the client and the tester to determine whether an attack detected during a penetration test is actually part of the authorized penetration test or whether it has been instigated by a third-party hacker.
During a penetration test, a tester gains physical access to the client’s facility using pretexting and is able to trigger a fail-open event for all of the organization’s electronic locking systems. As a result, all of the doors in the facility are unlocked. The client’s internal security team calls the penetration tester and asks them to stop the attack and immediately re-enable the door locks. What is this process called?
A.Situational awareness
B.Goal reprioritization
C.De-confliction
D.De-escalation
D.De-escalation
Explanation:
The term de-escalation refers to the process of communicating between the client and the tester to dial back the intensity of exploits or even stop them all together because of unsafe situations they may be causing.
Which of the following best describe a trusted agent during a penetration test?
A.A tester who secretly penetrates the target organization by applying for a job there
B.An individual within the target organization who has a direct line of communication with the penetration tester
C.An individual on the penetration testing team who has a direct line of communication with the IT staff of the target organization
D.A representative of the local law enforcement agency who has been briefed about the test by the penetration tester
B.An individual within the target organization who has a direct line of communication with the penetration tester
Explanation:
The term trusted agent refers to an individual within the target organization, typically an IT administrator or a manager, who has a direct line of communication with the penetration tester. This individual is usually responsible for de-confliction and de-escalation communications between the client and the tester.
You are conducting a black box penetration test for a client. The reconnaissance phase of the test is complete, and you are ready to move on to the next phase. Before doing so, you communicate with the client and inform them that test is moving from one
phase to another. Which type of communication trigger was used in this scenario?
A.Stages
B.Critical findings
C.Communication path
D.Indicators of prior compromise
A.Stages
Explanation:
A stages communication trigger happens when the penetration test progresses from one phase to another.
You are conducting a gray box penetration test for a client. During the test, you discover that many users’ Windows desktop systems haven’t been patched properly and are still vulnerable to several common types of ransomware. Instead of waiting until the end of the test, you immediately communicate with the client to warn them that their systems are vulnerable. Which type of communication trigger was used in this scenario?
A.Risk rating
B.Critical findings
C.Findings and remediation
D.Indicators of prior compromise
B.Critical findings
Explanation:
A critical findings communication trigger happens when a penetration tester discovers a security vulnerability so serious that it must be addressed immediately instead of waiting until the test has been completed.
You are conducting a white box penetration test for a client. During the test, you discover a hidden backdoor administrator account on one of the client’s Active Directory domain controllers. You check the logs of the domain controller and find that the backdoor account is being actively used on a daily basis. Instead of waiting until the end of the test, you immediately communicate with the client to warn them that their server has been compromised. Which type of communication trigger was used in this scenario?
A.Stages
B.Critical findings
C.Communication path
D.Indicators of prior compromise
D.Indicators of prior compromise
Explanation:
An indicator of prior compromise communication trigger happens when a penetration tester discovers that the network or a system has already been compromised previously by another attacker. In this situation, the tester usually communicates the discovery with the client immediately instead of waiting until the test is complete.
You are conducting a black box penetration test for a client. The enumeration phase of the test is complete, and you are ready to begin exploiting vulnerable systems. Before doing so, you communicate with the client and inform them that test is transitioning. Which type of communication trigger was used in this scenario?
A.Risk rating
B.Critical findings
C.Findings and remediation
D.Stages
D.Stages
Explanation;
A stages communication trigger happens when the penetration test progresses from one phase to another.
You are conducting a white box penetration test for a client. During the test, you notice outgoing network traffic consistent with a distributed denial of service (DDoS) attack. You suspect that internal systems have been infected with malware, creating an amplifier network for the attack. Instead of waiting until the end of the test, you immediately communicate with the client to warn them. Which type of communication trigger was used in this scenario?
A.Stages
B.Indicators of prior compromise
C.Findings and remediation
D.Critical findings
B.Indicators of prior compromise
Explanation:
An indicator of prior compromise communication trigger happens when a penetration tester discovers that the network or a system has already been compromised previously by another attacker. In this situation, the tester usually communicates the discovery with the client immediately instead of waiting until the test is complete.
You are conducting a gray box penetration test for a client. During the test, you discover that help desk technicians are using authenticated but unencrypted FTP connections over the Internet to transfer files to computers located at remote branch-office sites. As such, their credentials are potentially being exposed on the public network. Even though this represents a tempting target for you to exploit, you recognize the immediate risk associated with this practice. Instead of waiting until the end of the test, you immediately communicate with the client to warn them that privileged credentials are potentially being exposed on the Internet. Which type of communication trigger was used in this scenario?
A.Stages
B.Critical findings
C.Communication path
D.Indicators of prior compromise
B.Critical findings
Explanation:
A critical findings communication trigger happens when a penetration tester discovers a security vulnerability so serious that it must be addressed immediately instead of waiting until the test has been completed.
You are conducting a black box penetration test for a client. The test is now complete, and you are ready to begin cleaning up after yourself. Before doing so, you communicate with the client and inform them that the test is complete and to be aware that cleanup activates will be occurring. Which type of communication trigger was used in this scenario?
A.Risk rating
B.Critical findings
C.Stages
D.Indicators of prior compromise
C.Stages
Explanation:
A stages communication trigger happens when the penetration test progresses from one phase to another.
You are conducting a black box penetration test for a small financial institution. Using pretexting, you are able to gain access to the target facility by posing as a copier repair person. As you walk through the building, you notice that almost all employees have written their (overly complex) passwords on sticky notes and posted them on their computer monitors and keyboards. Some are so obvious that they can be seen by keen-eyed customers. This represents a tempting target for you to exploit; however, you recognize the immediate risk associated with this practice. Instead of waiting until the end of the test, you immediately communicate with the client to warn them that credentials are plainly visible. Which type of communication trigger was used in this scenario?
A.Indicators of prior compromise
B.Critical findings
C.Communication path
D.Stages
B.Critical findings
Explanation:
A critical findings communication trigger happens when a penetration tester discovers a security vulnerability so serious that it must be addressed immediately instead of waiting until the test has been completed.
You are conducting a white box penetration test for a client. During the test, you notice that all end-user workstations are configured with only the default Windows antivirus scanner. You further notice that many end users use an application to complete their daily work that is a known Trojan horse commonly used to create a botnet. Instead of waiting until the end of the test, you immediately communicate with the client to warn them.
Which type of communication trigger was used in this scenario?
A. Indicators of prior compromise
B.Critical findings
C.Communication path
D.Stages
A. Indicators of prior compromise
Explanation:
An indicator of prior compromise communication trigger happens when a penetration tester discovers that the network or a system has already been compromised previously by another attacker. In this situation, the tester usually communicates the discovery with the client immediately instead of waiting until the test is complete.
You are conducting a PCI DSS penetration test for a client. During the testing process, a dangerous ransomware exploit begins to spread between networks around the world. The client asks you to halt the PCI DSS penetration test and instead test to see whether their network is vulnerable to this new type of malware. Which term best describes what happened in this scenario?
A.Situational awareness
B.Goal reprioritization
C.Indicators of prior compromise
D.Attestation of findings
B.Goal reprioritization
Explanation:
Goal reprioritization occurs when either the client or the tester decides to change the focus of the penetration test from the agreed upon scope after the test has already started. In this scenario, the PCI DSS test is being modified to include testing for vulnerability for the new type of ransomware.
You are conducting a gray box penetration test for a client. During the testing process, you notice that their wireless network uses weak encryption with a preshared key (00000001) that is easy to brute-force crack. Further, you notice that client has implemented omnidirectional access points throughout the facility. You suspect that the wireless signal is emanating far outside the building. You contact the client and recommend that the test be modified to include testing of the Wi-Fi network from a black box perspective. Which term best describes what happened in this scenario?
A.Goal reprioritization
B.Attestation of findings
C.Indicators of prior compromise
D.Situational awareness
A.Goal reprioritization
Explanation:
Goal reprioritization occurs when either the client or the tester decides to change the focus of the penetration test from the agreed upon scope after the test has already started. In this scenario, a black box component has been added to a traditional gray box test.
Which of the following terms refers to the process of gathering data produced by the various tools in a penetration test and formatting the data in a consistent manner such that it can be easily read?
A.Attestation of findings
B.Normalization of data
C.Remediation
D.Disposition of reports
B.Normalization of data
Explanation:
When you normalize the data from a penetration test, you aggregate all the data generated by all of the different tools and processes you used during the test and format it such that it is consistent and easy to understand.
You are generating a written report of findings after a penetration test. During the test, you followed the NIST 800-115 standard. In which section of the report should you include this information?
A.Executive summary
B.Methodology
C.Findings and remediation
D.Metrics and measures
B.Methodology
Explanation:
When creating your written report of findings after completing a penetration test, you should identify the standard or guidelines you used to conduct the test in the Methodology section. In this example, you would inform the reader that you used the NIST 800-115 methodology.
You are generating a written report of findings after a penetration test. In which section of the report should you provide the reader with a high-level synopsis of the test and the results?
A.Executive summary
B.Methodology
C.Findings and remediation
D.Metrics and measures
A.Executive summary
Explanation:
When creating your written report of findings after completing a penetration test, you should provide a high-level synopsis of the test and the results in the Executive Summary. Typically, this is the first section of the report and is intended for less-technical audiences.
You are generating a written report of findings after a penetration test. In which section should you report risk ratings?
A.Executive summary
B.Methodology
C.Findings and remediation
D.Metrics and measures Conclusion
D.Metrics and measures Conclusion
Explanation:
When creating your written report of findings after completing a penetration test, you should report your risk ratings in the Metrics and Measures section. These ratings allow the reader to prioritize risks as well as make comparisons between penetration tests conducted over time.
Which section of a written report of penetration test findings is intended to be read by less-technical audiences?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
A.Executive summary
Explanation:
When creating your written report of findings after completing a penetration test, you should provide a high-level synopsis of the test and the results in the Executive Summary. Typically, this is the first section of the report and is intended for less-technical audiences.
THIS IS A DUMB FUCKING QUESTION
You are generating a written report of findings after a penetration test. During the test, you followed the specifications of the EC-Council for its Certified Ethical Hacker (CEH) certification. Where should this information be included in your report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
B.Methodology
Explanation:
When creating your written report of findings after completing a penetration test, you should identify the standard or guidelines you used to conduct the test in the Methodology section. In this example, you would inform the reader that you used the EC-Council’s CEH methodology.
You are generating a written report of findings after a penetration test. During the test, you discovered that many older Windows workstations in the network haven’t been patched properly and are susceptible to the WannaCry ransomware. Where should you include this information in your report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
C.Findings and remediation
Explanation:
When creating your written report of findings after completing a penetration test, you should list the vulnerabilities you discovered in the Findings and Remediation section of the report, along with how you found them.
You are generating a written report of findings after a penetration test. During the test, you discovered that many older Windows workstations in the network haven’t been patched properly and are susceptible to the WannaCry ransomware. To fix this, the client needs to install the MS17-010 – Critical update from Microsoft. Where should you include this recommendation in your report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
C.Findings and remediation
Explanation:
When creating your written report of findings after completing a penetration test, you should list the vulnerabilities you discovered in the Findings and Remediation section of the report, along with how you found them and what the client can do to fix the problem. In this example, you should recommend they install the MS17-010 – Critical update from Microsoft in this section.
You are generating a written report of findings after a penetration test. You cross-reference each vulnerability you found in the test against the Common Vulnerabilities and Exposures (CVE) database to assign it a qualitative risk rating of Low, Medium, High, or Critical. Where should these risk ratings be included in the report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
D.Metrics and measures
Explanation:
When creating your written report of findings after completing a penetration test, you should report your risk ratings in the Metrics and Measures section. These ratings allow the reader to prioritize risks as well as make comparisons between penetration tests conducted over time.
You are generating a written report of findings after a penetration test. Based on the results of the test, you have created a list of recommendations you feel the client should focus on. Where should you include your recommendations in the report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
E.Conclusion
Explanation:
When creating your written report of findings after completing a penetration test, you should report your recommendations in the Conclusion section.
You are generating a written report of findings after a penetration test. In which section of the report should you consider the risk appetite of the client when deciding which information to include?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
C.Findings and remediation
Explanation:
The information you include in the Findings and Remediation section of your written report of findings will usually be constrained by the client’s risk appetite. For example, an organization with a higher-risk appetite may want you to only include information about high-risk or critical-risk vulnerabilities you discovered and not report medium or low-risk vulnerabilities.
You are generating a written report of findings after a penetration test. Based on the sheer number of vulnerabilities you discovered in the test, you feel that the client should undergo a follow-up penetration test within the next three months to verify that the issues have been remediated. Where should you include this recommendation in the report?
A.Executive summary B.Methodology C.Findings and remediation D.Metrics and measures E.Conclusion
E.Conclusion
Explanation:
When creating your written report of findings after completing a penetration test, you should report your recommendations in the Conclusion section, including when you think the client should conduct follow-up penetration tests.
You have just finished writing a report of findings for a client after a penetration test. How long is your organization required to store the document after the test is complete?
A.Six months
B.One year
C.Five years
D.Depends on the client contract
D.Depends on the client contract
Explanation:
Typically, there is no legally mandated storage time for reports after a penetration test is complete. The amount of time you are required to store the client’s report will usually be governed by your contract with the client.
You have just finished writing a report of findings for a client after a penetration test. Which of the following is an appropriate way to store your client’s written report of findings?
A.Print a hard copy and keep it in a file folder on your desk.
B.Save it to a flash drive that is stored in a pen holder on your desk.
C.Burn it to a rewritable optical disc and store it in desk drawer.
D.Save it to an encrypted file on a file server.
D.Save it to an encrypted file on a file server.
Explanation:
The written report of findings contains highly sensitive information and should therefore be securely handled. It should not be stored in a manner that would allow it to be easily stolen. In this scenario, storing the report in an encrypted file on a file server would make it more difficult for the file to be stolen than the other options listed.
You have just finished writing a report of findings for a client after a penetration test. Which of the following is an appropriate way to store your client’s written report of findings?
A.Print a hard copy and store it in a locked filing cabinet that has been bolted to the floor.
B.Save it to your Google drive account.
C.Save it in a file on your laptop.
D.Burn it to a rewritable optical disc and store it in a CD caddy on your desk.
A.Print a hard copy and store it in a locked filing cabinet that has been bolted to the floor.
Explanation:
The written report of findings contains highly sensitive information and should therefore be securely handled. It should not be stored in a manner that would allow it to be easily stolen. In this scenario, storing a hard copy of the report in a locked filing cabinet that has been bolted to the floor would make it more difficult for the report to be stolen than the other options listed.
You have just finished writing a report of findings for a client after a penetration test. Which of the following is an appropriate way to store your client’s written report of findings?
A.Burn the report to an optical disk and store it in a locked safe bolted to your desk.
B.Save the file to an encrypted flash drive.
C.Copy the file to your phone.
D.Save the report to a file on your workstation’s desktop.
A.Burn the report to an optical disk and store it in a locked safe bolted to your desk.
Explanation:
The written report of findings contains highly sensitive information and should therefore be securely handled. It should not be stored in a manner that would allow it to be easily stolen. In this scenario, burning the file to an optical disc and storing it in a secured safe would make it more difficult for the report to be stolen than the other options listed.
You have just finished writing a report of findings for a client after a penetration test. Which of the following is an appropriate way to store your client’s written report of findings?
A.Burn the report to an optical disk and keep it in a hanging file folder in your desk.
B.Save the file to an encrypted flash drive and store it in a locket cabinet.
C.Copy the file to your phone.
D.Save the report to your organization’s FTP server.
B.Save the file to an encrypted flash drive and store it in a locket cabinet.
Explanation:
The written report of findings contains highly sensitive information and should therefore be securely handled. It should not be stored in a manner that would allow it to be easily stolen. In this scenario, saving the file to an encrypted flash drive and storing it in a secured cabinet would make it more difficult for the report to be stolen than the other options listed.
You need to dispose of several penetration test reports from old clients. The files are stored on a removable hard drive that is stored in a locked safe. Which of the following is the best way to do this?
A.Delete the files from the drive.
B.Use the fdisk utility to repartition the drive.
C.Use disk wiping software on the drive.
D.Reformat the drive.
C.Use disk wiping software on the drive.
Explanation:
The written report of findings contains highly sensitive information and should therefore be disposed of securely. It should not be disposed of in a manner that would allow it to be stolen or reconstructed. In this scenario, wiping the drive will make it much harder to recover the files from the drive.
You need to dispose of several penetration test reports from old clients. Hard copies of the reports are stored in a locked filing cabinet that has been bolted to the floor. Which of the following is the best way to do this?
A.Put the reports in the garbage.
B.Put the reports in the recycle bin.
C.Stack the reports upside down by your team’s printer for use as “scratch paper.”
D.Shred the report in a cross-cut shredder.
D.Shred the report in a cross-cut shredder.
Explanation:
The written report of findings contains highly sensitive information and should therefore be disposed of securely. It should not be disposed of in a manner that would allow it to be stolen or reconstructed. In this scenario, shredding the
documents will make it much harder to recover the data from the reports.
You need to dispose of several penetration test reports from old clients. The files are stored on flash drives that are stored in a locked cabinet. Which of the following is the best way to do this?
A.Smash the drives with a hammer.
B.Delete the files from the drives.
C.Use the Disk Management utility to repartition the drives.
D.Reformat the drives using File Explorer in Windows.
A.Smash the drives with a hammer.
Explanation:
The written report of findings contains highly sensitive information and should therefore be disposed of securely. It should not be disposed of in a manner that would allow it to be stolen or reconstructed. In this scenario, physically destroying inexpensive flash drives will make it much harder to recover the data from the reports.
You need to dispose of several penetration test reports from old clients. The files are stored on rewritable optical discs that are stored in a locked cabinet. Which of the following is the best way to do this?
A.Delete the files from the discs.
B.Shred the discs.
C.Delete the files and then save new files to the discs.
D.Reformat the discs.
B.Shred the discs.
Explanation:
The written report of findings contains highly sensitive information and should therefore be disposed of securely. It should not be disposed of in a manner that would allow it to be stolen or reconstructed. In this scenario, physically destroying optical discs will make it much harder to recover the data from the reports.
You have just concluded a penetration test for a client that makes extensive use of work-at-home employees. The employees use a VPN connection. During the test, you were able to use social engineering to compromise an employee’s VPN connection and gain access to the internal network. As a mitigation strategy, you recommend that the client implement multifactor authentication for all VPN connections. What type of solution is this?
A.Technological
B.People
C.Process
D.Tactical
A.Technological
Explanation:
Implementing multifactor authentication for VPN connections is an example of a technological mitigation strategy.
You have just concluded a penetration test for a client. During the test, you were able to use social engineering techniques to gain access to the server room inside the client’s facility. To address this vulnerability, you recommend that the client require security awareness training for all employees every six months. What type of solution is this?
A.Technological
B.People
C.Process
D.Tactical
B.People
Explanation:
Implementing regular security awareness training for all employees is an example of a people-based mitigation strategy.
You have just concluded a penetration test for a client. During the test, you were able to use stale user accounts associated with former employees to gain access to a sensitive file server. To address this vulnerability, you recommend that the client remove
user accounts whenever an employee leaves the organization. What type of solution is this?
A.Technological
B.People
C.Process
D.Strategic
C.Process
Explanation:
Implementing off-boarding processes for employees when they leave the organization is an example of a process-based mitigation strategy.
You have just concluded a penetration test for a client. During the test, you discovered that system administrators were using unencrypted Telnet sessions to remotely manage sensitive servers. You were able to sniff network traffic and capture administrative credentials from these connections. To address this vulnerability, you recommend that the client require all IT staff to pass a network security certification exam. What type of solution is this?
A.Technological
B.People
C.Process
D.Strategic
B.People
Explanation:
Requiring IT staff members to pass a network security certification exam is an example of a people-based mitigation strategy.
You have just concluded a penetration test for a client. During the test, you were able to use John the Ripper to brute force an administrative password on a sensitive Windows file server. To address this vulnerability, you recommend that the client implement Group Policy settings that require complex passwords as well as lock the system after three incorrect logon attempts. What type of solution is this?
A.Technological
B.People
C.Process
D.Scalable
A.Technological
Explanation:
Requiring complex passwords and implementing account restrictions are examples of technological mitigation strategies.
You have just concluded a penetration test for a client. The client has more than 2,000 employees, but only two of them are network administrators. During the test, you were able to quickly overwhelm them with the sheer volume of your attacks. To address this vulnerability, you recommend that the client hire additional network administrators who have cybersecurity credentials and experience. What type of solution is this?
A.Technological
B.People
C.Process
D.Scalable
B.People
Explanation:
Hiring additional IT staff members who have experience with cyber security is an example of a people-based mitigation strategy.
You have just concluded a penetration test for a client. During the test, you discovered that the organization’s employees made extensive use of a shared Google Drive account to collaborate. You were able to use a social engineering exploit to get access to the shared account and access sensitive files. To address this vulnerability, you recommend that the client disallow this practice among employees. What type of solution is this?
A.Technological
B.People
C.Process
D.Scalable
C.Process
Explanation:
Forbidding employees from using external cloud-based services such as Google Drive is an example of a process-based mitigation strategy.
You have just concluded a penetration test for a client. During the test, you were able to gain access to the client’s physical facility by tailgating with a group of employees. To address this vulnerability, you recommend that the client implement a man-trap locking door at the entrance to the facility. What type of solution is this?
A.Technological
B.People
C.Process
D.Scalable
A.Technological
Explanation:
Implementing a mantrap at the main entrance is an example of a technological mitigation strategy.
You have just concluded a penetration test for a client. During the test, you were able to gain access to the client’s wireless network using Aircrack-ng while sitting in your car in a parking lot across the street. To address this vulnerability, you recommend that the client implement directional wireless network antennas and also manipulate the power level of the access points to prevent signal emanation. What type of solution is this?
A.Technological
B.People
C.Process
D.Scalable
A.Technological
Explanation:
Implementing directional wireless antennas and manipulating access point power levels to prevent signal emanation are examples of technological mitigation strategies.