Quiz 13 Flashcards
What process does a penetration tester rely on to access an ever-higher level of resources?
continuous exploitation
persistence
pivot
spinning
persistence
Which item below is the standard security checklist against which systems are evaluated for a security posture?
baseline
control
profile
threat
baseline
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are imitations of real data files?
honeypot
honeynet
honeycomb
port scanner
honeypot
Vulnerability scanning should be conducted on existing systems and particularly as new technology equipment is deployed.
True
False
True
In white box and gray box testing, the first task of the tester is to perform preliminary information gathering on their own from outside the organization, sometimes called open source intelligence (OSINT).
True
False
False
The second step in a vulnerability assessment is to determine the assets that need to be protected.
True
False
False
Netstat displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and DNS settings.
True
False
False
What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?
black box
gray box
white box
sealed box
black box
Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.
active
intrusive
passive
non-intrusive
non-intrusive
Which tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications?
white box
replay
system
black box
white box
What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?
active
invasive
passive
evasive
passive
What process addresses how long data must be kept and how it is to be secured?
legal and compliance
data methodology
legal retention
data retention
data retention
The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?
threat mitigation
threat profiling
threat modeling
risk modeling
threat modeling
Which data erasing method will permanently destroy a magnetic-based hard disk by reducing or eliminating the magnetic field?
wiping
degaussing
purging
data sanitation
degaussing
What term is defined as the state or condition of being free from public attention to the degree that you determine?
privacy
secure
contentment
freedom
privacy
An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?
protocol analyzer
system analyzer
application analyzer
threat profiler
protocol analyzer
Nslookup displays detailed information about how a device is communicating with other network devices.
True
False
False