question
Incident response (IR) is an important part of organizational security. In what step of theincident-handling process would IR team members disable or delete user accounts andchange firewall rules?A. Detection and AnalysisB. Classification and PrioritizationC. ContainmentD. Forensic Investigation
answer
C. ContainmentSteps to contain the incident occur here. This may include steps to revoke or suspend user accounts and blocking system or even subnet access viafirewall or other methods
question
A software company puts an application through stringent testing and, on the date of release, is confident the software is free of known vulnerabilities. An organization named BigBiz purchases the software at a premium cost, with a guarantee of service, maintenance, and liability. Which risk management method is in use by the BigBiz organization?A. AcceptB. TransferC. AvoidD. Mitigate
question
Which of the following provide automated pen test-like results for an organization?(Choose all that apply.)A. MetasploitB. NessusC. Core ImpactD. CANVASE. SAINTF. GFI Languard
answer
A. MetasploitC. Core ImpactD. CANVASMetasploit offers autopwn, and CANVAShas a similar run everything mode; however, all lack the ability to provide resultsthat a true pen test would provide.Core Impact is probably the best-known, all-inclusive automated testing framework.Per its website (http://www.coresecurity.com/content/core-impact-overview)Per the Immunity Security website (http://www.immunitysec.com), CANVASmakes available hundreds of exploits, an automated exploitation system, and acomprehensive, reliable exploit development framework to penetration testers andsecurity professionals.
question
Which of the following best describes an assessment against a network segment that tests for existing vulnerabilities but does not attempt to exploit any of them?A. Penetration testB. Partial penetration testC. Vulnerability assessmentD. Security audit
answer
C. Vulnerability assessment
Don’t waste time
You can get a custom paper by one of our expert writers.
Get your custom essay
Helping students since 2015
question
You are a member of a pen test team conducting tests. Your team has all necessary scope, terms of engagement, and nondisclosure and service-level agreements in place. You gain access to an employee's system and during further testing discover child pornography on a hidden drive folder. Which of the following is the best course of action for the ethical hacker?A. Continue testing without notification to anyone, but ensure the information isincluded in the final outbrief report.B. Continue testing without interruption, but completely remove all hidden files andthe folder containing the pornography.C. Stop testing and notify law enforcement authorities immediately.D. Stop testing and remove all evidence of intrusion into the machine.
answer
C. Stop testing and notify law enforcement authorities immediately.
question
In which phase of a pen test is scanning performed?A. Pre-attackB. AttackC. Post-attackD. Reconnaissance
question
Which of the following describes risk that remains after all security controls have beenimplemented to the best of one's ability?A. ResidualB. InherentC. DeferredD. Remaining
question
Which of the following statements are true regarding OSSTMM? (Choose all that apply.)A. OSSTMM is a non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.B. OSSTMM recognizes ten types of controls, which are divided into two classesC. ISECOM maintains the OSSTMM.D. OSSTMM defines three types of compliance.
answer
B. OSSTMM recognizes ten types of controls, which are divided into two classesC. ISECOM maintains the OSSTMM.D. OSSTMM defines three types of compliance.
question
Which of the following is an open source project produced by OISSG (Open Information Systems Security Group) intended to provide security testing assistance?A. OSSTMMB. OWASPC. COBITD. ISSAF
answer
D. ISSAFThe Information Systems SecurityAssessment Framework (ISSAF) is produced by the Open Information SystemsSecurity Group, and is intended to comprehensively report on the implementationof existing controls to support IEC/ISO 27001:2005(BS7799), Sarbanes OxleySOX404, CoBIT, SAS70 and COSO, thus adding value to the operational aspectsof IT related business transformation programmes
question
NIST SP 800-30 defines steps for conducting a risk assessment. Which of the following statements is true regarding the process?A. Threats are identified before vulnerabilities.B. Determining the magnitude of impact is the first step.C. Likelihood is determined after the risk assessment is complete.D. Risk assessment is not a recurring process.
answer
A. Threats are identified before vulnerabilities.NIST 800-30 Guide for Conducting Risk Assessments (http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf )
question
In which phase of a pen test will the team penetrate the perimeter and acquire targets?A. Pre-attackB. AttackC. Post-attackD. None of the above
question
An organization participates in a real-world exercise designed to test all facets of their security systems. An independent group is hired to assist the organization's security groups, assisting in the defense of assets against the attacks from the attacking group.Which of the following statements is true?A. The group assisting in the defense of the systems is referred to as a blue team.B. The group assisting in the defense of the systems is referred to as a red team.C. The group assisting in the defense of the systems is known as a white-hat group.D. The team attacking the systems must provide all details of any planned attack with thedefense group before launching to ensure security measures are tested appropriately.
answer
A. The group assisting in the defense of the systems is referred to as a blue team.
question
Which of the following best describes the difference between a professional pen test teammember and a hacker?A. Ethical hackers are paid for their time.B. Ethical hackers never exploit vulnerabilities; they only point out their existence.C. Ethical hackers do not use the same tools and actions as hackers.D. Ethical hackers hold a predefined scope and agreement from the system owner.
answer
D. Ethical hackers hold a predefined scope and agreement from the system owner.
question
Sally is part of a penetration test team and is starting a test. The client has provided a network drop on one of their subnets for Sally to launch her attacks from. However, they did not provide any authentication information, network diagrams, or other notable data concerning the systems. Which type of test is Sally performing?A. External, white boxB. External, black boxC. Internal, white boxD. Internal, black box
answer
D. Internal, black box
question
Your pen test team is discussing services with a potential client. The client indicates theydo not see the value in penetration testing. Which of the following is the correct responsefrom your team?A. Run a few tests and display the results to the client to prove the value of penetration testing.B. Provide detailed results from other customers you've tested, displaying the value of planned testing and security deficiency discovery.C. Provide information and statistics regarding pen testing and security vulnerabilities from reliable sources.D. Perform the penetration test anyway in case they change their mind.
answer
C. Provide information and statistics regarding pen testing and security vulnerabilities from reliable sources.
question
In which phase of a penetration test would you compile a list of vulnerabilities found?A. Pre-attackB. AttackC. Post-attackD. Reconciliation
question
Which of the following has a database containing thousands of signatures used to detect vulnerabilities in multiple operating systems?A. NessusB. HpingC. LOICD. SNMPUtil
question
Cleaning registry entries and removing uploaded files and tools are part of which phase ofa pen test?A. Covering tracksB. Pre-attackC. AttackD. Post-attack
question
Which of the following are true statements regarding a pen test? (Choose all that apply.)A. Pen tests do not include social engineering.B. Pen tests may include unannounced attacks against the network.C. During a pen test, the security professionals can carry out any attack they choose.D. Pen tests always have a scope.E. A list of all personnel involved in the test is not included in the final report.
answer
B. Pen tests may include unannounced attacks against the network.D. Pen tests always have a scope.
question
Which of the following causes a potential security breach?A. VulnerabilityB. ThreatC. ExploitD. Zero day
question
Which Metasploit payload type operates via DLL injection and is difficult for antivirus software to pick up?A. InlineB. MeterpreterC. StagedD. Remote
question
Metasploit is a framework allowing for the development and execution of exploit codeagainst a remote host and is designed for use in pen testing. The framework consists of several libraries, each performing a specific task and set of functions. Which library is considered the most fundamental component of the Metasploit framework?A. MSF CoreB. MSF BaseC. MSF interfacesD. Rex
question
Which of the following may be effective countermeasures against an inside attacker?(Choose all that apply.)A. Enforce elevated privilege control.B. Secure all dumpsters and shred collection boxes.C. Enforce good physical security practice and policy.D. Perform background checks on all employees.