Wiley - Assessment Test missed/items Flashcards
Ricky is conducting a penetration test against a web application and is looking for potential vulnerabilities to exploit. Which of the following vulnerabilities does not commonly exist in web applications?
- SQL injection
- VM escape
- Buffer overflow
- Cross‐site scripting
VM Escape
Web applications commonly experience SQL injection, buffer overflow, and cross‐site scripting vulnerabilities. Virtual machine (VM) escape attacks work against the hypervisor of a virtualization platform and are not generally exploitable over the web. You’ll learn more about all of these vulnerabilities in Chapters 5 and 9.
NDA
A nondisclosure agreement, or NDA, is a legal agreement that is designed to protect the confidentiality of the client’s data and other information that the penetration tester may encounter during the test.
SOW
An SOW is a statement of work, which defines what will be done during an engagement
MSA
An MSA is a master services agreement that sets the overall terms between two organizations (which then use SOWs to describe the actual work)
Noncompete
Noncompetes are just that—an agreement that prevents competition, usually by preventing an employee from working for a competitor for a period of time after their current job ends.
Chris is assisting Ricky with his penetration test and would like to extend the vulnerability search to include the use of dynamic testing. Which one of the following tools can he use as an interception proxy?
- ZAP
- Nessus
- SonarQube
- OllyDbg
The Zed Attack Proxy (ZAP) from the Open Web Application Security Project (OWASP) is an interception proxy that is very useful in penetration testing
ZAP
The Zed Attack Proxy (ZAP) from the Open Web Application Security Project (OWASP) is an interception proxy that is very useful in penetration testing
Nessus
Vulnerability Scanner
Nessus is designed to identify and report on potential vulnerabilities in computer systems, networks, and applications. It performs this task by scanning for open ports, detecting services running on those ports, and then testing those services for known vulnerabilities
SonarQube
SonarQube is a comprehensive code quality assurance tool designed to analyze and improve the quality, security, and maintainability of source code.SonarQube is a static software testing tool (SAST tool)
OllyDbg
OllyDbg is a powerful, user-friendly debugger and disassembler primarily designed for reverse engineering and debugging applications on Microsoft Windows
Renee is conducting a penetration test and discovers evidence that one of the systems she is exploring was already compromised by an attacker. What action should she take immediately after confirming her suspicions?
- Record the details in the penetration testing report.
- Remediate the vulnerability that allowed her to gain access.
- Report the potential compromise to the client.
- No further action is necessary because Renee’s scope of work is limited to penetration testing.
Report the potential compromise to the client.
Which of the following vulnerability scanning methods will provide the most accurate detail during a scan?
- Black box
- Authenticated
- Internal view
- External view
An authenticated, or credentialed, scan provides the most detailed view of the system. Black‐box assessments presume no knowledge of a system and would not have credentials or an agent to work with on the system. Internal views typically provide more detail than external views, but neither provides the same level of detail that credentials can allow.
Annie wants to cover her tracks after compromising a Linux system. If she wants to permanently remove evidence of the commands she inputs to a Bash shell, which of the following commands should she use?
- history -c
- kill -9 $$
- echo “” ˃ /~/.bash_history
- ln /dev/null ~/.bash_history -sf
ln /dev/null ~/.bash_history -sf
Although all of these commands are useful for covering her tracks, only linking /dev/null to .bash_history will prevent the Bash history file from containing anything.
Kaiden would like to perform an automated web application security scan of a new system before it is moved into production. Which one of the following tools is best suited for this task?
- Nmap
- Nikto
- Wireshark
- CeWL
Nikto
Nikto
Nikto is a free, open-source web server scanner designed to identify and report on potential vulnerabilities and misconfigurations in web servers.