Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. This is information from multiple sources that is available to the general public A. OSINT B.

1.  This is information from multiple sources that is available to the general public
    A.     OSINT
    B.     bug bounty
    C.     active reconnaissance
    D.     warflying

2.  _____ are the boundaries of a penetration test.
    A.     persistence
    B.     pivot
    C.     lateral movement
    D.     rules of engagement (RoE)

3.  What do we need from an organization before we legally do a penetration test on an organization?
    A.     permission
    B.     internal network credentials
    C.     nothing
    D.     IP address

4.  _____ is using tools to gain more information.
    A.     cleanup
    B.     pivot
    C.     persistence
    D.     rules of engagement (RoE)

5.  What is a way to detect wireless networks, map location of organization, and determine security settings of an organization?
    A.     OSINT
    B.     warflying
    C.     active reconnaissance
    D.     bug bounty

6.  What of the following involves creating backdoors, alternate user accounts, and setting up encrypted connections?
    A.     privilege escalation
    B.     rules of engagement (RoE)
    C.     pivot
    D.     persistence

7.  In pentesting, these are the referees, so they set the rules of engagement and oversee the testing.
    A.     Red team
    B.     White team
    C.     Purple team
    D.     Blue team

8.  In pentesting, this is the defensive team, so they use security controls to protect network resources.
    A.     White team
    B.     Blue team
    C.     Purple team
    D.     Red team

9.  You are a pentester. You know NOTHING about the system you are testing. What kind of testing are you doing?
    A.     open box testing
    B.     translucent box testing
    C.     cardboard box testing
    D.     closed box testing

10.  What of the following is NOT a legal activity?
    A.     collecting data from a wireless network
    B.     bug bounty
    C.     active reconnaissance
    D.     collecting data from social media

Step by Step Solution

3.42 Rating (158 Votes )

There are 3 Steps involved in it

Step: 1

A OSINT Open Source Intelligence This involves gathering information from publicly available sources such as websites social media public records etc ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Finance Markets Investments and Financial Management

Authors: Melicher Ronald, Norton Edgar

15th edition

9781118800720, 1118492676, 1118800729, 978-1118492673

More Books

Students also viewed these Programming questions

Question

Explain the concept of shear force and bending moment in beams.

Answered: 1 week ago

Question

How can a firm use float to slow down its disbursements?

Answered: 1 week ago

Question

=+a. Draw a diagram of this RAID system.

Answered: 1 week ago

Question

=+b. Calculate the reliability at t 5 800,000 cycles.

Answered: 1 week ago