Filters
Question type

Study Flashcards

List at least four things that a vulnerability scanner can do.

Correct Answer

verifed

verified

A vulnerability scanner can do the follo...

View Answer

In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).

Correct Answer

verifed

verified

False

Discuss one type of asset that an organization might have.

Correct Answer

verifed

verified

An organization has many different types...

View Answer

If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?


A) pivot
B) spinning
C) persistence
D) secondary exploitation

Correct Answer

verifed

verified

What term is defined as the state or condition of being free from public attention to the degree that you determine?


A) freedom
B) secure
C) privacy
D) contentment

Correct Answer

verifed

verified

Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )


A) Statistical inferences.
B) Associations with groups.
C) Private and consumer data
D) Individual inconveniences and identity theft.

Correct Answer

verifed

verified

Describe a penetration testing report.

Correct Answer

verifed

verified

The end product of a penetration test is...

View Answer

Which of the following is the goal of a vulnerability scan? (Choose all that apply. )


A) identify vulnerabilities
B) identify common misconfigurations
C) identify threat actors
D) identify a lack of security controls

Correct Answer

verifed

verified

An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?


A) application analyzer
B) protocol analyzer
C) threat profiler
D) system analyzer

Correct Answer

verifed

verified

What process does a penetration tester rely on to access an ever higher level of resources?


A) pivot
B) spinning
C) persistence
D) continuous exploitation

Correct Answer

verifed

verified

C

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?


A) application search
B) application control
C) firewall monitoring
D) virus control

Correct Answer

verifed

verified

What is the name of the process that basically takes a snapshot of the current security of an organization?


A) threat analysis
B) vulnerability appraisal
C) risk assessment
D) threat assessment

Correct Answer

verifed

verified

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?


A) port scanner
B) honeynet
C) honeypot
D) honeycomb

Correct Answer

verifed

verified

The second step in a vulnerability assessment is to determine the assets that need to be protected.

Correct Answer

verifed

verified

Which item below is the standard security checklist against which systems are evaluated for a security posture?


A) profile
B) threat
C) control
D) baseline

Correct Answer

verifed

verified

Explain the concepts of personal data theft and identity theft.

Correct Answer

verifed

verified

Personal data theft involves user person...

View Answer

During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?


A) threat scanner
B) vulnerability profiler
C) port scanner
D) application profiler

Correct Answer

verifed

verified

What process addresses how long data must be kept and how it is to be secured?


A) legal retention
B) data retention
C) legal and compliance
D) data methodology

Correct Answer

verifed

verified

What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?


A) active
B) passive
C) invasive
D) evasive

Correct Answer

verifed

verified

B

List and describe the three categories that TCP/IP divides port numbers into.

Correct Answer

verifed

verified

Well-known port numbers (0-1023).Reserve...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer