Deck 4: Exploring Penetration Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 4: Exploring Penetration Testing
1
Which of the following biases involves making a decision before investigating and then only looking for data that supports the theory?
A) Present bias
B) Framing effect
C) Confirmation bias
D) Availability bias
A) Present bias
B) Framing effect
C) Confirmation bias
D) Availability bias
C
2
What term describes an expansion of a test beyond the initial set of the test's limitations?
Creep
3
At which level of penetration testing are testers given limited knowledge of the network and some elevated privileges?
A) Gray box
B) White box
C) Black box
D) Yellow box
A) Gray box
B) White box
C) Black box
D) Yellow box
A
4
______________ bias tends to discount future risks and gains in favor of immediate gratification.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not considered an advantage of contracting with an external third party to conduct a penetration test?
A) Expertise
B) Focus
C) Experience
D) Cost
A) Expertise
B) Focus
C) Experience
D) Cost
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What is the process of turning binary machine language back into source code?
A) Reverse engineering
B) Disassembling
C) Decomposition
D) Decompensation
A) Reverse engineering
B) Disassembling
C) Decomposition
D) Decompensation
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What term describes a network of vendors, manufacturers, and distributors that move a product from the supplier to the customer?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is the isolation of malware from interaction with a computer's operating system, hardware, and files?
A) Disassembling
B) Sandboxing
C) Decompiling
D) Reverse engineering
A) Disassembling
B) Sandboxing
C) Decompiling
D) Reverse engineering
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
A risk matrix is a visual color-coded tool that lists the impact and likelihood of risks.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
For software, a digital representation or _______________ of the original file can be created and then compared against a later version of the file; if the two versions match, the code has not changed.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck