Pentest+ Practice Exam Chapter 12 Reporting and Communication (Jonanthan Ammerman) Flashcards
When preparing a penetration test report, which of the following is not a recommended best practice?
A. Verification and full documentation of findings
B. Robust accounting of testing methodology
C. Omission of findings lower than 3.0 on the CVSS 3.0
D. Reduction of redundancy and streamlining of data presented
C. Omission of findings lower than 3.0 on the CVSS 3.0
Explanation:
Omission of any findings would be unethical and counterproductive to the purpose of a penetration test. It is far better to overreport findings no matter how seemingly inconsequential—a penetration tester works to provide information on vulnerabilities found on a given network, subnet, or system. It is upon the client to determine how that information is turned into action, or which portions require attention.
Which component of a written penetration test report is meant to provide a high-level overview of findings without getting too wrapped up in the technical details? A. Conclusion B. Executive summary C. Methodology D. Risk ratings
B. Executive summary
Explanation:
The component described is the executive summary. As hinted at in the name, the executive summary aims to provide a 50,000-foot view of the penetration test report without relying on technical terms that may not mean anything to readers.
Which of the following choices best defines the term “risk appetite” with regard to information security?
A. The ability or willingness of an organization to withstand the effects of any events or situations that adversely affect its business assets, such as computer systems or networks
B. An organization’s understanding and acceptance of the likelihood and impact of a specific threat on its systems or networks
C. A key factor that helps an organization determine if a penetration test is a financially supportable business expense
D. The amount and kinds of risk an organization is willing to accept in its information systems environment
D. The amount and kinds of risk an organization is willing to accept in its information systems environment
Explanation:
Risk appetite is defined as the amount and kinds of risk an organization is willing to accept, and can be expected to drive much of the organization’s decision making when pursuing mitigation techniques for vulnerabilities discovered during a penetration test.
Which of the following is a secure, reasonable method for the handling and disposition of a penetration test report?
A. Encrypt the file with DES, send it to the declared recipients as detailed in your statement of work, and determine a secondary communication channel through which to send the decryption password (if not previously declared in the SOW).
B. E-mail the file in plaintext
C. Encrypt the file with AES-256, provide it to the declared recipients as detailed in your statement of work, and determine a secondary communication channel through which to send the decryption password (if not previously declared in the SOW) D. Encrypt the file with AES-256, upload it to a publicly viewable repository of reports written by your organization, and determine a secondary channel through which to send the decryption password (if not previously declared in the SOW)
C. Encrypt the file with AES-256, provide it to the declared recipients as detailed in your statement of work, and determine a secondary communication channel through which to send the decryption password (if not previously declared in the SOW)
Explanation:
Of the options presented, the best solution for handling and disposition of a penetration test report is to encrypt the file with AES-256, provide it to the declared recipients as detailed in your statement of work, and determine a secondary communication channel through which to send the decryption password (if not previously declared in the SOW).
While wrapping up a penetration test, you look through your notes and see that you made changes to the root crontab as shown here:
What change most likely needs to be made as part of the post-engagement cleanup?
A. Change the first entry to run every day rather than every Monday
B.Change the fourth entry to perform a reload of the apache2 service rather than a reboot
C. Remove the /dev/null redirect of the output from the second entry
D. Delete the third entry
D. Delete the third entry
Explanation:
The third entry invokes a reverse shell call back to an attacking system at 10.1.2.2. Good penetration testing ethics demands that we eliminate readily exploitable artifacts of an engagement, removing any vulnerabilities that may have necessarily been introduced. A reverse shell in the root user’s crontab is an obvious penetration testing fragment and should therefore be removed.
Which section of a penetration test report details broad, strategic information about testing techniques and practices used as well as the decision-making processes that guided information collection, analysis, and risk evaluation? A. Executive summary B. Methodology C. Risk ratings D. Appendixes
B. Methodology
Explanation:
The methodology section of a penetration test report details information about testing techniques and practices used, and the decision-making processes that guided information collection, analysis, and risk evaluation, presenting a view of the strategic approach to the engagement used by the penetration testing team.
A is incorrect because the executive summary of a written penetration test report serves to provide a high-level overview of findings without getting too wrapped up in the technical details. C is incorrect because risk ratings are a component of the findings and remediation section of a penetration test that serve to quantify the dangers presented by vulnerabilities in a readily understood manner. D is incorrect because the appendixes are the final portions of a penetration test report and consist of supplemental material that is related to the report but not critical for the purposes of understanding its contents
When finalizing a penetration test report prior to delivery to a client, which document should be consulted to ensure that all acceptance criteria are being met? A. Statement of work B. Rules of engagement C. Nondisclosure agreement D. Executive summary
A. Statement of work
Explanation:
Acceptance criteria are detailed in the statement of work for a penetration test. B, C, and D are incorrect. B is incorrect because the rules of engagement cover the guidelines and restrictions to be observed during a penetration test. C is incorrect because the nondisclosure agreement for a penetration test ensures that sensitive corporate information is protected from unauthorized disclosure or dissemination. D is incorrect because the executive summary is a component of a written penetration test report that is intended to provide a high-level overview of things that does not get mired down in technical knowledge that may confuse or otherwise put off non technical readers such as executive personnel
When detailing findings in a penetration test report, which of the following can serve as evidence for the purpose of attestation? (Choose all that apply.)
A. Human- and machine-readable format reports from automated security scanners
B. Written descriptions
C. Entries on exploit-db.com
D. Screenshots of exploitation or vulnerabilities
D. Screenshots of exploitation or vulnerabilities
Explanation:
Screenshots of vulnerabilities on display or exploits at work are the gold standard for providing proof of a vulnerability. When providing attestation of results, it is a good best practice to back up one’s words with hard evidence. A, B, and C are incorrect. A is incorrect because automated scanners can produce false positives and should never be accepted at face value; anything identified by a scanner should be tested and verified. B is incorrect because while written descriptions are helpful in communicating
the nature of a vulnerability and the potential threat it represents, a description does not provide proof of a vulnerability in and of itself. C is incorrect because while exploit code from exploit-db.com or other sources can be useful in detailing the ease of exploitation of a vulnerability, they do not prove the vulnerability’s presence.
Which section of a penetration test report details discovered vulnerabilities, explains the risk they carry, and provides appropriate recommendations to secure the system in question? A. Nondisclosure agreement B. Findings and remediation C. Methodology D. Appendixes
B. Findings and remediation
Explanation:
The findings and remediation section of a penetration test report details any vulnerabilities that have been discovered and provides recommendations for mitigation of the same.
A, C, and D are incorrect. A is incorrect because a nondisclosure agreement is a pre-engagement document that ensures that sensitive corporate information is protected from unauthorized disclosure or dissemination. C is incorrect because the methodology portion of a penetration test report provides detailed information about testing techniques and practices used, and the decision-making processes that guided information collection, analysis, and risk evaluation during the penetration testing process. D is incorrect because appendixes are the final portions of a penetration test report, consisting of supplemental material that is related to the report but not critical for the purposes of understanding its contents.
While wrapping up a penetration test, you look through your notes and see that you made changes to the list of authorized users for a system as shown here: What change most likely needs to be made as part of the post-engagement cleanup?
A. Enable the Guest account for traveling client executive personnel
B. Add a user for the client’s new systems administrator
C. Delete the user account you added for persistence on the system
D. Change the administrator password to a previously agreed-upon keyword
C. Delete the user account you added for persistence on the system
C is correct. In the scenario described in the question, the user account described should be deleted.
As a rule of thumb, if a change made to a system during the course of a pentest would leave a system vulnerable, the change should be reverted wherever possible and always reported.
There are caveats; for example, log files that may have captured evidence of your actions should be left intact, as they can provide the clients defenders valuable information for refining their detection and alerting processes
While working on a penetration test report for a client organization, you note that there were numerous discrepancies in software package versions installed on business-critical servers. How might this issue best be mitigated?
A. Revision of client scripts used to execute system updates
B. Remedial training for client systems administrators C. Implementation of patching and change control programs
D. Refrain from patching systems until software logic flaws prevent work from being completed
C. Implementation of patching and change control programs
Explanation:
his is an example of a situation where a procedural recommendation can best serve to mitigate vulnerabilities or flaws in an environment. The best recommendation here is to implement patching and change control programs, which would help ensure that changes are made to all systems when required, while also minimizing business disruption and providing tracking of those changes. Proper implementation of patch and change management
can help provide further information if a tool or resource suddenly begins experiencing problems
Of the following choices, which type of finding is most amplified in severity by a resulting inability to confirm the source of actions taken on a given system using a highly privileged account, effectively destroying the concept of non-repudiation for a given user?
A. SQL injection
B. Single-factor authentication
C. Shared local administrator credentials
D. Unnecessary open services
C. Shared local administrator credentials
Explanation:
The finding described is the sharing of local administrator credentials. While there is some obvious necessity in retaining a local administrator account in the event that a system becomes unresponsive or unavailable over the network, deploying a secure mechanism for retaining that password is a best practice. Options for mitigation of this finding include Microsoft’s LAPS—Local Administrator Password Solution—which periodically randomizes the local administrator password and secures the account by requiring authorized users to request access to the password (effectively logging times of access and the users responsible), or through commercial competing products such as Centrify’s SAPM (Shared Account Password Management), which operates in a similar fashion.
One potential reason for communicating with the client point of contact during a penetration test is to ensure that a penetration tester’s actions are clearly identifiable and distinct from the actions of system accounts or other users that may occur in the environment. What is this concept known as? A. De-confliction
B. Impact mitigation
C. Collision detection
D. Deprogramming
A. De-confliction
Explanation:
A is correct. De-confliction is the process of identifying a penetration tester’s actions so as to clearly differentiate them from actions of system accounts or other users that may occur in the environment. In the context of a penetration test, de-confliction is used to assist in identifying root causes of unexpected behavior that may occur during an engagement.
Which section of a penetration test report consists of supplemental material that is related to the report but is not critical for the purposes of understanding its contents? Examples may include nmap scan results, automated scan output, or other code written or deployed in the course of the penetration test. A. Executive summary
B. Findings
C. Appendixes
D.Methodology
C. Appendixes
Explanation:
The appendixes of a penetration test report consist of supplemental material that is related to the report but not critical for the purposes of understanding its contents. Examples may include nmap scan results, automated scan output, or other code written or deployed in the course of the penetration test.
Which post-report delivery activity is focused on identifying any patterns within the types of vulnerabilities discovered in an organization’s networks during a penetration test, and the identification of broader knowledge that can be gained from the specific details of the penetration test results?
A. Debriefing/closing meeting
B. Post-engagement cleanup
C. Engagement survey
D. Retesting
A. Debriefing/closing meeting
Explanation:
Of the choices presented, debriefing/closing meeting is the best fit. The closing meeting can often take the form of an after-action review (AAR), where the overall timeline of the engagement is analyzed in its entirety. The goal here is to identify key lessons learned, which can be taken to the client organization and used to drive needed changes in its security program.
During a penetration test, you determine that you require additional information before testing a discovered web application, but your point of contact is unresponsive. Which of the following describes the best course of action in this situation?
A. Consult the rules of engagement to determine the next individual in the communications path
B. Reach out to one of the organization’s web developers, as they are responsible for the web application and its maintenance
C. Contact one of the organization’s systems administrators, as the web application runs on servers they tend
D. E-mail the CISO of the organization directly for further information
A. Consult the rules of engagement to determine the next individual in the communications path
Explanation:
If the point of contact is unresponsive, the appropriate course of action is always to refer to the rules of engagement to identify the secondary and tertiary contact points when communication is necessary.