14.2.4 Practice exam – Flashcards

Unlock all answers in this set

Unlock answers
question
You have decided to perform a double blind penetration test. Which of the following actions would you perform first?
answer
Inform senior management
question
Which of the following activities are typically associated with penetration testing? (select two)
answer
Attempting social engineering Running a port scanner
question
Which of the following types of penetration test teams will provide you information that is most revealing of a real-world hacker attack?
answer
Zero knowledge team
question
A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to a wireless network and then uses NMAP to probe various network hosts to see which operating system they are running. Which process did the administrator use in the penetration test in this scenario?
answer
Active fingerprinting
question
A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario?
answer
Passive fingerprinting
question
Drag each penetration test characteristic on the left to the appropriate penetration test name on the right.
answer
White box test The tester has detailed information about the target system prior to starting the test. Grey Box test The tester has the same about of information that would be available to a typical insider in the organization. Black box test The tester has no prior knowledge of the target system. Single blind test Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed. Double blind test The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed
question
Match each network enumeration technique on the left with its corresponding description on the fish.
answer
Identifying phone number with modems War dialing Scanning for wireless access points Wardriving Identifying operating system type and version number Banner grabbing Identifying services that can pass through a firewall Firewalking
question
What is the main difference between vulnerability scanning and penetration testing?
answer
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.
question
Which of the following is included in an operations penetration test? (select three)
answer
1. Looking through discarded papers or media for sensitive information 2.Eavesdropping or obtaining sensitive information from items that are not properly stored 3.Acting as an imposter with the intent to gain access or information
question
Which phase or step of security assessment is a passive activity
answer
Reconnaissance
question
What is the primary purpose of penetration testing?
answer
Test the effectiveness of your security perimeter
question
Which of the following identifies an operating system or network service based upon it response to ICMP messages?
answer
Fingerprinting
question
Which of the following uses hacking techniques to proactively discover internal vulnerabilities?
answer
Penetration testing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New