Quiz 1 Flashcards
In which phase do you attempt to extract information such as usernames, computer names, network resources, shares, and services?
Maintaining access
Reconnaissance
Enumeration
Establishing access
Enumeration
Which “threat actor” may cross ethical lines, but usually has good intentions?
Gray hat
Which “team” is a defensive security team that attempts to close vulnerabilities and stop the red team?
Blue team
Regardless of the hacker’s motivation and skill set, one goal for many hackers is to execute what’s known as a/an _______________.
Total Destruction Attack (TDA)
Advanced Persistent Threat (APT)
Distributed Denial of Service (DDoS)
Denial of Service (DoS)
APT
What term refers to the process of analyzing the security of the organization and determining security holes?
Vulnerability testing
Threat modeling
Risk assessment
Penetration testing
Threat modeling
Which penetration testing document is used only as a last resort, but explains what the penetration tester is doing and that the work is fully authorized?
Master Service Agreement
Scope of Work
Rules of Engagement
Permission to Test
Permission to Test
What term refers to the practice of finding vulnerabilities and risks with the purpose of securing a computer or network system.
Whitehat Hacking
Hacking
Penetration Testing
Cracking
Penetration Testing
Which “threat actor” uses their skills for defensive purposes?
White Hat
Which penetration testing document covers items such as how to handle sensitive data and who to notify in case something goes wrong?
Master Service Agreement
Scope of Work
Rules of Engagement
Permission to Test
Rules of Engagement
Which penetration testing framework attempts to create one accepted method for a thorough security test?
Open Web Application Testing Methodology (OWATM)
Open Source Security Testing Methodology Manual (OSSTMM)
National Institute of Standards and Technology Special Publication 800-115 (NIST SP 800-115)
Open Web Application Security Project (OWASP)
Open Source Security Testing Methodology Manual (OSSTMM)
Which of the following is the final phase in the ethical hacking methodology?
Clearing tracks
Performing reconnaissance
Scanning and enumeration
Maintaining access
Clearing tracks
Which penetration testing type simulates an outside attack and is also the most expensive?
Black box
White box
Gray box
Green box
Black box
Which of the following is NOT one of the four common methods for dealing with risk?
Acceptance
Avoidance
Transference
Ignorance
Ignorance
What standard defines the processes and requirements for an organization’s information security management systems?
Sarbanes-Oxley (SOX)
DMCA
ISO/IEC 27001
PCI DSS
ISO/IEC 27001
Which penetration test is an objective-based test that focuses on the overall security of the organization and its data security?
None of these
Compliance-Based Penetration Test
Objective-Based Penetration Test
Goal-Based Penetration Test
Objective-Based Penetration Test