ProProf - Penetration Testing MCQ Quiz Flashcards

1
Q

Is penetration testing used to help or to damage a system?
A. Helping
B. Securing
C. Damaging
D. Both A & C

A

Helping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are ways to conduct penetration testing?
A. Black Box Testing, White Box Testing, Grey Box Testing
B. Black Box Testing, Red Box Testing, Grey Box Testing
C. White Box Testing, Brown Box Testing, Red Box Testing
D. Black Box Testing, Green Box Testing, White Box Testing

A

Black Box Testing, White Box Testing, Grey Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Penetration testing should focus on what scenarios?
A. Most likely
B. Most dangerous
C. Both
D. None

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ is not included in penetration tests.
A. To identify the automated system failure
B. Determining the feasibility
C. Both
D. None

A

To identify the automated system failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?
A. Using force to gain access to the information you need
B. Hacking either telecommunication or wireless networks to gain access to the information you need
C. Using manipulation to deceive people that you are someone you are not to gain access to the information you need
D. Using force to gain all the information available

A

Using manipulation to deceive people that you are someone you are not to gain access to the information you need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following Operating Systems are most effective in penetration testing in networks?
A. Ubuntu, Red Hat, Arch Linux
B. Windows, Mac OSX, Google Chrome OS
C. BackTrack, Helix, PHLAK
D. None of these

A

BackTrack, Helix, PHLAK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An incorrect statement about the Web Application Firewall (WAF) would be
A. It identifies dangerous malformed attacks
B. It can identify malicious worms
C. Both
D. None

A

None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the risk involved in doing penetration testing?
A. You have to pay for the testing
B. Some operations of the company might slow down
C. Skynet takes over the world
D. None of these

A

Some operations of the company might slow down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following groups must a penetration testing review?
A. Documentation, Log, System Configuration, Ruleset, Network Sniffing, File Integrity
B. Documentation, Log, System Configuration, Network Sniffing, File Integrity
C. Documentation, Log, System Configuration, Network Sniffing, Ruleset, File Integrity, Personnel
D. None of these

A

Documentation, Log, System Configuration, Ruleset, Network Sniffing, File Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly