ProProf - Penetration Testing MCQ Quiz Flashcards
Is penetration testing used to help or to damage a system?
A. Helping
B. Securing
C. Damaging
D. Both A & C
Helping
Which of the following are ways to conduct penetration testing?
A. Black Box Testing, White Box Testing, Grey Box Testing
B. Black Box Testing, Red Box Testing, Grey Box Testing
C. White Box Testing, Brown Box Testing, Red Box Testing
D. Black Box Testing, Green Box Testing, White Box Testing
Black Box Testing, White Box Testing, Grey Box Testing
Penetration testing should focus on what scenarios?
A. Most likely
B. Most dangerous
C. Both
D. None
Both
________ is not included in penetration tests.
A. To identify the automated system failure
B. Determining the feasibility
C. Both
D. None
To identify the automated system failure.
What is social engineering?
A. Using force to gain access to the information you need
B. Hacking either telecommunication or wireless networks to gain access to the information you need
C. Using manipulation to deceive people that you are someone you are not to gain access to the information you need
D. Using force to gain all the information available
Using manipulation to deceive people that you are someone you are not to gain access to the information you need
Which of the following Operating Systems are most effective in penetration testing in networks?
A. Ubuntu, Red Hat, Arch Linux
B. Windows, Mac OSX, Google Chrome OS
C. BackTrack, Helix, PHLAK
D. None of these
BackTrack, Helix, PHLAK
An incorrect statement about the Web Application Firewall (WAF) would be
A. It identifies dangerous malformed attacks
B. It can identify malicious worms
C. Both
D. None
None
What is the risk involved in doing penetration testing?
A. You have to pay for the testing
B. Some operations of the company might slow down
C. Skynet takes over the world
D. None of these
Some operations of the company might slow down.
Which of the following groups must a penetration testing review?
A. Documentation, Log, System Configuration, Ruleset, Network Sniffing, File Integrity
B. Documentation, Log, System Configuration, Network Sniffing, File Integrity
C. Documentation, Log, System Configuration, Network Sniffing, Ruleset, File Integrity, Personnel
D. None of these
Documentation, Log, System Configuration, Ruleset, Network Sniffing, File Integrity