Quiz 1 Flashcards

1
Q

In which phase do you attempt to extract information such as usernames, computer names, network resources, shares, and services?

Maintaining access

Reconnaissance

Enumeration

Establishing access

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which “threat actor” may cross ethical lines, but usually has good intentions?

A

Gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which “team” is a defensive security team that attempts to close vulnerabilities and stop the red team?

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regardless of the hacker’s motivation and skill set, one goal for many hackers is to execute what’s known as a/an _______________.

Total Destruction Attack (TDA)

Advanced Persistent Threat (APT)

Distributed Denial of Service (DDoS)

Denial of Service (DoS)

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term refers to the process of analyzing the security of the organization and determining security holes?

Vulnerability testing

Threat modeling

Risk assessment

Penetration testing

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which penetration testing document is used only as a last resort, but explains what the penetration tester is doing and that the work is fully authorized?

Master Service Agreement

Scope of Work

Rules of Engagement

Permission to Test

A

Permission to Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What term refers to the practice of finding vulnerabilities and risks with the purpose of securing a computer or network system.

Whitehat Hacking

Hacking

Penetration Testing

Cracking

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which “threat actor” uses their skills for defensive purposes?

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which penetration testing document covers items such as how to handle sensitive data and who to notify in case something goes wrong?

Master Service Agreement

Scope of Work

Rules of Engagement

Permission to Test

A

Rules of Engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which penetration testing framework attempts to create one accepted method for a thorough security test?

Open Web Application Testing Methodology (OWATM)

Open Source Security Testing Methodology Manual (OSSTMM)

National Institute of Standards and Technology Special Publication 800-115 (NIST SP 800-115)

Open Web Application Security Project (OWASP)

A

Open Source Security Testing Methodology Manual (OSSTMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the final phase in the ethical hacking methodology?

Clearing tracks

Performing reconnaissance

Scanning and enumeration

Maintaining access

A

Clearing tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which penetration testing type simulates an outside attack and is also the most expensive?

Black box

White box

Gray box

Green box

A

Black box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT one of the four common methods for dealing with risk?

Acceptance

Avoidance

Transference

Ignorance

A

Ignorance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What standard defines the processes and requirements for an organization’s information security management systems?

Sarbanes-Oxley (SOX)

DMCA

ISO/IEC 27001

PCI DSS

A

ISO/IEC 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which penetration test is an objective-based test that focuses on the overall security of the organization and its data security?

None of these

Compliance-Based Penetration Test

Objective-Based Penetration Test

Goal-Based Penetration Test

A

Objective-Based Penetration Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly