Module 2: Threat Management & Cybersecurity Resources Q Flashcards
What is the primary goal of penetration testing?
Attempt to uncover deep vulnerabilities and then manually exploit them
The primary goal of penetration testing is to uncover deep vulnerabilities and then manually exploit them
There is often confusion between vulnerability scanning and penetration testing. What is the best explanation of the difference between vulnerability scanning and penetration testing?
Vulnerability scanning is performed using an automated tool to scan a network for known vulnerability signatures. Penetration testing involves attempting to manually uncover deep vulnerabilities just as a threat actor would, and then exploiting them
This is the correct difference between vulnerability scanning and penetration testing
Khalid joins a security team where he is assigned an SOC developer role and has to build different teams under SOC. Which of the following teams should he build to deal with providing real-time feedback related to security incidents and threat detections, which can then be utilized to facilitate better prioritization of threats and a mature way of detecting threats?
Purple team
The purple team provides real-time feedback between the red and blue teams to enhance the testing
Kile is assigned a role as a grey box penetration tester in the financial sector. He has to conduct a pen testing attack on all the application servers in the network. Which of the following tasks should he perform first while conducting a penetration testing attack on a network?
Footprinting
Footprinting is the process of collecting as much information about the target system as possible to find ways to penetrate the system. Information such as IP address, whois records, DNS information, operating system, employee email id, phone numbers, etc., comes under this
Which of the following tools can be used to scan 16 IP addresses for vulnerabilities?
Nessus Essentials
Nessus has a free version called Nessus Essentials that scans 16 IP addresses
Which of the following penetration testing consultants have limited knowledge of the network and some elevated privileges?
Gray box
Gray box testers have limited knowledge of the network and some elevated privileges
Which of the following is the most efficient means of discovering wireless signals?
War flying
War flying is the most efficient means of discovering a Wi-Fi signal. War flying uses drones, which are officially known as unmanned aerial vehicles. Because they can quickly cover a wider area, are not limited to streets and sidewalks, and can easily fly over security perimeters such as fences, drones are the preferred means of finding Wi-Fi signals
Which of the following techniques is a method of passive reconnaissance?
Open Source Intelligence (OSINT)
OSINT is used to search online for publicly accessible information. It is a method of passive reconnaissance
What is the primary difference between credentialed and non-credentialed scans?
Credentialed scans use valid authentication credentials to mimic threat actors, while non-credentialed scans do not provide authentication credentials
Credentialed scans are the process where valid authentication credentials are supplied to the vulnerability scanner to mimic the work of a threat actor who possesses these credentials. A non-credentialed scan provides no such authentication information
Alice, a vulnerability assessment engineer at a bank, is told to find all the vulnerabilities on an internet-facing web application server running on port HTTPS. When she finishes the vulnerability scan, she finds several different vulnerabilities at different levels. How should she proceed?
Look at the priority and the accuracy of the vulnerability
Looking at the priority and the accuracy of the vulnerability is the most appropriate approach for Alice
Which of the following is a characteristic of a vulnerability scan that is not a characteristic of a penetration test?
A vulnerability scan is usually automated
A vulnerability scan is automated, while a penetration test is performed manually
A cyber analyst needs to quickly do a vulnerability scan on an enterprise network with many devices. Which approach should the analyst take?
Scan the most important devices for as long as it takes for each device
When there is limited time to scan a network and provide efficient and effective results, it’s best to scan the most important devices, like internet-facing web, app, and DB servers, for as long as it takes for each device
A vulnerability assessment engineer performed vulnerability scanning on active directory servers and discovered that the active directory server is using a lower version of Kerberos. To alert management to the risk behind using a lower version of Kerberos, he needs to explain what an attacker can do to leverage the vulnerabilities in it. Which of the following actions can the attacker perform after exploiting vulnerabilities in Kerberos?
Use privilege escalation
After compromising a low-level user account, privilege escalation is the only possible way to gain access to a highly privileged user, such as a domain admin or enterprise admin, so that the red teamer can do more damage to the network
Which of the following is NOT an automated vulnerability scanning tool?
ELK Stack
ELK Stack is a data monitoring tool used as an SIEM and threat hunting solution
What are the primary features of a security information event management (SIEM) tool?
Aggregation, correlation, event deduplication, time synchronization, and alerting
Aggregation, correlation, event deduplication, time synchronization, and alerting are the important features of a SIEM tool