Exam 13: Vulnerability Assessment and Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

What process does a penetration tester rely on to access an ever higher level of resources?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?

(Multiple Choice)
4.8/5
(31)

What is the name of the process that basically takes a snapshot of the current security of an organization?

(Multiple Choice)
4.9/5
(30)

The second step in a vulnerability assessment is to determine the assets that need to be protected.

(True/False)
4.7/5
(36)

What term is defined as the state or condition of being free from public attention to the degree that you determine?

(Multiple Choice)
4.7/5
(34)

List at least four things that a vulnerability scanner can do.

(Essay)
4.8/5
(39)

Which item below is the standard security checklist against which systems are evaluated for a security posture?

(Multiple Choice)
4.9/5
(33)

An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?

(Multiple Choice)
4.8/5
(34)

Which of the following is the goal of a vulnerability scan? (Choose all that apply. )

(Multiple Choice)
4.7/5
(28)

Discuss one type of asset that an organization might have.

(Essay)
4.9/5
(34)

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?

(Multiple Choice)
5.0/5
(30)

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?

(Multiple Choice)
5.0/5
(40)

List and describe the three categories that TCP/IP divides port numbers into.

(Essay)
4.9/5
(38)

Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )

(Multiple Choice)
4.9/5
(36)

Describe a penetration testing report.

(Essay)
4.8/5
(28)

Explain the concepts of personal data theft and identity theft.

(Essay)
4.7/5
(34)

During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?

(Multiple Choice)
4.9/5
(42)

What process addresses how long data must be kept and how it is to be secured?

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)