CREST - CPSA MAIN Exam Questions With Correct Answers
1 view 0 purchase
Course
CREST CPSA
Institution
CREST CPSA
CREST - CPSA MAIN Exam Questions With
Correct Answers
3306? - answerMySQL (structured Query Language) Database management system for web
database, data warehousing, e-commerce, and logging applications
What port does squid proxy use? - answer3128
What are the benefits of a penetration test? - ...
CREST - CPSA MAIN Exam Questions With
Correct Answers
3306? - answer✔MySQL (structured Query Language) Database management system for web
database, data warehousing, e-commerce, and logging applications
What port does squid proxy use? - answer✔3128
What are the benefits of a penetration test? - answer✔- Enhancement of the management
system
- Avoid fines
- Protection from financial damage
- Customer protection
What is the structure of a penetration test? - answer✔Planning and Preparation
Reconnaissance
Discovery
Analyzing information and risks
Active intrusion attempts
Final analysis
Report Preparation
What is another structure of a penetration test? - answer✔Reconnaissance
Vulnerability Scanning
Investigation
Exploitation
What is does infrastructure testing include? - answer✔Includes all internal computer systems,
associated external devices, internet networking, cloud and virtualization testing.
What are the types of infrastructure testing? - answer✔- External Infrastructure Penetration
Testing
- Internal Infrastructure Penetration Testing
- Cloud and Virtualization Penetration Testing
- Wireless Security Penetration Testing
What does External Infrastructure Testing include? - answer✔Mapping flaws in the external
infrastructure
What are the benefits of External Infrastructure Testing ? - answer✔- Identifies flaws within the
firewall configuration that could be misused.
- Finds how information could be leaked out from the system
- Suggests how these issues could be fixed
- Prepares a comprehensive report highlighting the security risk of the networks and suggests
solutions
- Ensures overall efficiency and productivity of your business
What are the benefits of Internal Infrastructure testing? - answer✔-Identifies how an internal
attacker could take advantage of even a minor security flaw
- Identifies the potential business risk and damage that an internal attacker can inflict
- Improves security systems of internal infrastructure
- Prepares a comprehensive report giving details of the security exposures of internal networks
along with the detailed action plan on how to deal with it
What are the benefits of cloud and virtualization penetration testing? - answer✔- Discover the
real risks within the virtual environment and suggests the methods and costs to fix the threats
and flaws
- Provides guidelines and an action plan how to resolve the issues
- Improves the overall protection systems
- Prepares a comprehensive security system report of the cloud computing and virtualization,
outline the security flaws, causes and possible solutions
What are the benefits of wireless security penetration testing ? - answer✔- To find the
potential risk caused by your wireless device
- To provide guidelines and an action plan on how to protect from the external threats
- For preparing a comprehensive security system report of the wireless networking, to outline
the security flaw, causes, and possible solutions
What is Black Box Testing? - answer✔Black-box testing is a method in which the tester is
provided no information about the application being tested.
What are the advantages of Black Box Testing? - answer✔- Test is generally conducted with the
perspective of a user, not the designer
- Verifies contradictions in the actual system and the specifications
What are the disadvantages of black box penetration testing? - answer✔- Particularly, these
kinds of test cases are difficult to design
- Possibly, it is not worth, in-case designer has already conducted a test case
- It does not conduct everything
What is white box penetration testing ? - answer✔A tester is provided a whole range of
information about the systems and/or network such as schema, source code, os details, ip
address, etc.
What are the advantages of white box penetration testing? - answer✔- It ensures that all
independent paths of a module have been exercised
- It ensures that all logical decisions have been verified along with their true and false value.
- It discovers the typographical errors and does syntax checking
- It finds the design errors that may have occurred because of the difference between logical
flow of the program and the actual execution.
What are the important highlights of the computer misuse act 1990? - answer✔Section 1:
Unauthorized access to computer material
Section 2: Unauthorized access with intent to commit or facilitate commission of further
offenses
Section 3: Unauthorized acts with intent to impair, or with recklessness as to impairing the
operation of a computer
What are the important highlights of the human rights act 1998? - answer✔- The right to life
- The right to respect for private and family life
- The right to freedom of religion and belief
- Your right not to be mistreated or wrongly punished by the state
when capturing the scope of a penetration test, what information requires consent to meet the
UK laws? - answer✔-Name & Position of the individual who is providing consent
-Authorized testing period - both the date range and hours that testing is permitted
- Contact information for members of technical staff, who may provide assistance during the
test
- IP addresses or URL that are in scope of testing
- Exclusions to certain hosts, services or areas within application testing
Credentials that may be required as part of authenticated application testing
What are the important highlights of the data protection act 1998? - answer✔- Personal data
must be processed fairly and lawfully
- be obtained only for lawful purposes and not processed in any manner incompatible with
those purposes
- be adequate, relevant and not excessive
- be accurate and current
- not be retained for longer than neccessary
- be processed in accordance with the rights and freedoms of data subjects
- Be protected against unauthorized or unlawful processing and against accidental loss,
destruction or damage
What are the important highlights of the police and justice act 2006? - answer✔- Make
amendments to the computer misuse act 1990
- increased penalties of computer misuse act (makes unauthorized computer access serious
enough to fall under extradition)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Thebright. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.