Lesson 3: Performing Security Assessments Flashcards

1
Q

During a penetration test, systems administrators for a large company are tasked to play on the white team for an affiliated company. Examine each of the following roles and determine which role the systems admins will fill.

A. The systems admins will arbitrate the exercise, setting rules of engagement and guidance.

B. The systems admins will try to infiltrate the target system.

C. The systems admins will operate monitoring and alerting controls to detect and prevent the infiltration.

D. The systems admins will collaborate with attackers and defenders to promote constructive developments.

A

A
A white team sets the rules of engagement and monitors the exercise, providing arbitration and guidance, and if necessary, halt the exercise. If the red team is third party, the white team will include a representative of the consultancy company.

Red team acts offensively

Blue team performs the defensive role

In a purple team exercise, the red and blue teams meet for regular debriefs while the exercise is ongoing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A manufacturing company hires a pentesting firm to uncover any vulnerabilities in their network with the understanding that the pen tester receives no information about the company’s system. Which of the following penetration testing strategies is the manufacturing company requesting?

A. Black box

B. Sandbox

C. Gray box

D. White box

A
A
Black box (or blind) is when the pen tester receives no privileged information about the network and its security systems. Black box tests are useful for simulating the behavior of an external threat.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IT director reads about a new form of malware that targets a system widely utilized in the company’s network. The director wants to discover whether the network has been targeted, but also wants to conduct the scan without disrupting company operations or tipping off potential attackers to the investigation. Evaluate vulnerability scanning techniques and determine the best tool for the investigation.

A. Credentialed scan

B. Configuration review

C. Penetration testing

D. Threat hunting

A

D
Where a pen test attempts to demonstrate a system’s weakness or achieve intrusion, threat hunting is based only on analysis of data within the system. It is potentially less disruptive than pen testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which of these situations might a non-credentialed vulnerability scan be more advantageous than a credentialed scan? (Select all that apply.)

A. When active scanning poses no risk to system stability

B. External assessments of a network perimeter

C. Detection of security setting misconfiguration

D. Web application scanning

A

B, D
Non-credentialed scanning is often the most appropriate technique for external assessment of the network perimeter or when performing web application scanning.

A non-credentialed scan proceeds by directing test packets at a host without being able to log on to the OS or application. A non-credentialed scan provides a view of what the host exposes to an unprivileged user on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which statement best explains the differences between black box, white box, and gray box attack profiles used in penetration testing?

A. A black box pen tester acts as a privileged insider and must perform no reconnaissance. A white box pen tester has no access, and reconnaissance is necessary. A gray box actor is a third-party actor who mediates between a black box and white box pen tester.

B. A black box pen tester acts as the adversary in the test, while the white box pen tester acts in a defensive role. A gray box pen tester is a third-party actor who mediates between a black box pen tester and a white box pen tester.

C. In a black box pen test, the contractor receives no privileged information, so they must perform reconnaissance. In contrast, a white box pen tester has complete access and skips reconnaissance. A gray box tester has some, but not all information, and requires partial reconnaissance.

D. In a white box pen test, the contractor receives no privileged information, so they must perform reconnaissance. In contrast, a black box pen tester has complete access and skips reconnaissance. A gray box tester has some, but not all information, and requires partial reconnaissance.

A

C
A black box penetration tester receives no privileged information, while a white box tester has complete access. A white box test may follow up on a black box test.

In a black box pen test, the consultant receives no privileged information about the network and its security systems. A gray box pen tester has partial access and must perform some reconnaissance.

A red team performs an offensive role to try to infiltrate the target. A blue team defends a target system by operating monitoring and alerting controls to detect and prevent the infiltration.

White box tests are useful for simulating the behavior of a privileged insider threat. Gray box tests are useful for simulating the behavior of an unprivileged insider threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network manager needs a map of the network’s topology. The network manager is using Network Mapper (Nmap) and will obtain the visual map with the Zenmap tool. If the target IP address is 192.168.1.1, determine the command within Nmap that will return the necessary data to build the visual map of the network topology.

A. nmap -sn –ipconfig 192.168.1.1

B. nmap -sn –ifconfig 192.168.1.1

C. nmap -sn –traceroute 192.168.1.1

D. nmap -sn –nslookup 192.168.1.1

A

C
The traceroute command is used to probe a path from one end system to another, and lists the intermediate systems providing the link. The Nmap combined with Zenmap tools will give a visual of the network topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system administrator must scan the company’s web-based application to identify which ports are open and which operating system can be seen from the outside world. Determine the syntax that should be used to yield the desired information if the administrator will be executing this task from a Linux command line.

A. netstat -a

B. nmap -O webapp.company.com

C. nmap -sS 10.1.0.0/24

D. netstat -n

A

B
The correct syntax is nmap -O webapp.company.com. When the -O switch is used with nmap, it displays open ports and running software, but does not show the version.

The netstat command checks the state of ports on the local machine. In Linux, the -a switch displays ports in the listening state, it does not enable software and version detection.

Using nmap -sS 10.1.0.0/24 is a fast technique also referred to as half-open scanning, as the scanning host requests a connection without acknowledging it.

Netstat shows the state of TCP/UDP ports on the local machine. Netstat -n suppresses name resolution, so host IP addresses and numeric ports are shown in the output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Select the appropriate methods for packet capture. (Select all that apply.)

A. Wireshark

B. Packet analyzer

C. Packet injection

D. tcpdump

A

A, D
Wireshark and tcdump are packet sniffers. A sniffer is a tool that captures packets, or frames, moving over a network.

Wireshark is an open source graphical packet capture and analysis utility. Wireshark works with most operating systems, where tcpdump is a command line packet capture utility for Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements summarizes a disadvantage to performing an active vulnerability scan? (Select all that apply.)

A. Active scanning consumes more network bandwidth.

B. Active scanning runs the risk of causing an outage.

C. Active scanning may fail to identify all of a system’s known vulnerabilities.

D. Active scanning techniques do not use system login.

A

A, B
Scan intrusiveness is a measure of how much the scanner interacts with the target. Active scanning consumes more network bandwidth than passive scanning.

Active scanning means probing the device’s configuration using some type of network connection with the target. This type of scanning runs the risk of crashing the target of the scan or causing some other sort of outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hacker set up a Command and Control network to control a compromised host. What is the ability of the hacker to use this remote connection method as needed known as?

A. Weaponization

B. Persistence

C. Reconnaissance

D. Pivoting

A

B
Persistence refers to the hacker’s ability to reconnect to the compromised host and use it as a Remote Access Tool (RAT) or backdoor. To do this, the hacker must establish a Command and Control (C2 or C&C) network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analyze and eliminate the item that is NOT an example of a reconnaissance technique.

A. Initial exploitation

B. Open Source Intelligence (OSINT)

C. Social engineering

D. Scanning

A

A
The initial exploitation phase (also referred to as weaponization) is not a reconnaissance technique. It is an exploit that is used to gain some sort of access to the target’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compare and contrast vulnerability scanning and penetration testing. Select the true statement from the following options.

A. Vulnerability scanning is conducted by a “white hat” and penetration testing is carried out by a “black hat.”

B. Vulnerability scanning by eavesdropping is passive, while penetration testing with credentials is active.

C. Penetration testing and vulnerability scanning are considered “black hat” practices.

D. Vulnerability scanning is part of network reconnaissance, but penetration testing is not.

A

B
Vulnerability scanning and penetration testing can use passive or active reconnaissance techniques. A passive approach tries to discover issues without causing an impact to systems, whereas an active approach may cause instability on a scanned system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Select the statement which best describes the difference between a zero-day vulnerability and a legacy platform vulnerability.

A. A legacy platform vulnerability is unpatchable, while a zero-day vulnerability may be exploited before a developer can create a patch for it.

B. A zero-day vulnerability is unpatchable, while a legacy platform vulnerability can be patched, once detected.

C. A zero-day vulnerability can be mitigated by responsible patch management, while a legacy platform vulnerability cannot be patched.

D. A legacy platform vulnerability can be mitigated by responsible patch management, while a zero-day vulnerability does not yet have a patch solution.

A

A
A zero-day vulnerability is exploited before the developer knows about it or can release a patch. These can be extremely destructive, as it can take the vendor some time to develop a patch, leaving systems vulnerable in the interim.

A legacy platform is no longer supported with security patches by its developer or vendor. By definition, legacy platforms are not patchable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator uses two different automated vulnerability scanners. They regularly update with the latest vulnerability feeds. If the system regularly performs active scans, what type of error is the system most likely to make?

A. False positive

B. False negative

C. Validation error

D. Configuration error

A

A
A false positive is something that is identified by a scanner or other assessment tool as being a vulnerability, when in fact it is not.

False negatives are potential vulnerabilities that are not identified in a scan. This risk can be mitigated somewhat by running repeat scans periodically and by using scanners from more than one vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption vulnerabilities allow unauthorized access to protected data. Which component is subject to brute-force enumeration?

A. An unsecured protocol

B. A software vulnerability

C. A weak cipher

D. A lost decryption key

A

C
Weak encryption vulnerabilities allow unauthorized access to data. An algorithm or cipher used for encryption has known weaknesses that allow brute-force enumeration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examine each attack vector. Which is most vulnerable to escalation of privileges?

A. Software

B. Operating System (OS)

C. Applications

D. Ports

A

B
A vulnerability in an OS kernel file or shared library can allow privilege escalation, where the malware code runs with higher access rights (system or root). Root or system accounts are considered superuser accounts with administrative privileges.

17
Q

A contractor has been hired to conduct penetration testing on a company’s network. They have decided to try to crack the passwords on a percentage of systems within the company. They plan to annotate the type of data that is on the systems that they can successfully crack to prove the ease of access to data. Evaluate the penetration steps and determine which are being utilized for this task. (Select all that apply.)

A. Test security controls

B. Bypass security controls

C. Verify a threat exists

D. Exploit vulnerabilities

A

A, D
Two penetration test steps are being utilized by actively testing security controls and exploiting the vulnerabilities. Identifying weak passwords is actively testing security controls.

In addition, exploiting vulnerabilities is being used by proving that a vulnerability is high risk. The list of critical data obtained will prove that the weak passwords can allow access to critical information.

Bypassing security controls can be accomplished by going around controls that are already in place to gain access.

Verifying that a threat exists would have consisted of using surveillance, social engineering, network scanners, and/or vulnerability assessment tools to identify vulnerabilities.

18
Q

Identify the command that can be used to detect the presence of a host on a particular IP address.

A. ipconfig

B. ifconfig

C. ip

D. ping

A

D
The ping command can be used to detect the presence of a host on a particular IP address or that responds to a particular host name. This command is a fast and easy way to determine if a system can communicate over the network with another system.

19
Q

Following a data breach at a large retail company, their public relations team issues a statement emphasizing the company’s commitment to consumer privacy. Identify the true statements concerning this event.
(Select all that apply.)

A. The data breach must be an intentional act of corporate sabotage.

B. The privacy breach may allow the threat actor to sell the data to other malicious actors.

C. The data breach can cause data to be exfiltrated.

D. The data breach event may compromise data integrity, but not information availability.

A

B, C
A privacy breach may allow the threat actor to perform identity theft or to sell the data to other malicious actors. Malicious actors may obtain account credentials or use personal details and financial information to make fraudulent credit applications and purchases.

A data breach can cause a data exfiltration event to occur. A data exfiltration event is always intentional and malicious.

20
Q

An outside security consultant updates a company’s network, including data cloud storage solutions. The consultant leaves the manufacturer’s default settings when installing network switches, assuming the vendor shipped the switches in a default-secure configuration. Examine the company’s network security posture and select the statements that describe key vulnerabilities in this network.
(Select all that apply.)

A. The network is open to third-party risks from using an outside contractor to configure cloud storage settings.

B. The default settings in the network switches represent a weak configuration.

C. The use of network switches leaves numerous unused ports open.

D. The default settings in the network switches represent unsecured protocols.

A

A, B
Weaknesses in products or services in a supply chain can impact service availability and performance, or lead to data breaches. Suppliers and vendors in the chain rely on each other to perform due diligence.

Relying on the manufacturer default settings when deploying an appliance or software applications is a weak configuration. Although many vendors ship products in secure default configurations, it is insufficient to rely on default settings.

Default settings may leave unsecure interfaces enabled that allow an attacker to compromise the device. Weak settings on network appliances can allow attackers to move through the network unhindered and snoop on traffic.

An unsecure protocol transfers data as cleartext. It does not use encryption for data protection.