You have decided to perform a double blind penetration test. Which of the following actions would you perform first? |
Inform senior management |
What is the main difference between vulnerability scanning and penetration testing? |
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter. |
Which of the following is included in an operations penetration test? (select three) |
1. Looking through discarded papers or media for sensitive information 2.Eavesdropping or obtaining sensitive information from items that are not properly stored 3.Acting as an imposter with the intent to gain access or information |
Which phase or step of security assessment is a passive activity |
Reconnaissance |
Which of the following activities are typically associated with penetration testing? (select two) |
1. Running a port scanner 2. Attempting social engineering |
What is the primary purpose of penetration testing? |
Test the effectiveness of your security perimeter |
Which of the following identifies an operating system or network service based upon it response to ICMP messages? |
Fingerprinting |
Which of the following types of penetration test teams will provide you information that is most revealing of a real-world hacker attack? |
Zero knowledge team |
Which of the following uses hacking techniques to proactively discover internal vulnerabilities? |
Penetration testing |
11.2 Penetration Testing
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price