D484 PENETRATION TESTING MULTIPLE
CHOICE EXAM QUESTIONS AND
ANSWERS A+ GRADED
A public school system wishes to educate its student population with
cybersecurity knowledge. They're particularly interested in a resource
that provides a holistic, structured approach to Pen Testing and offers its
core materials without any cost. Which of the following is most suitable?
A.OWASP
B.NIST
C.OSSTMM
D.PTES
Verified Answer -C. OSSTMM
The Open-source Security Testing Methodology Manual (OSSTMM)
provides a holistic, structured approach to PenTesting and is open-
source, meaning its core materials are available without cost. This makes
it suitable for a public school system looking to provide cybersecurity
education without incurring additional expenses.
While performing a PenTest at a customer site, engineers configure
address resolution protocol spoofing on a Windows system while trying to
find vulnerabilities on a network. What will result from the engineer's
actions?
A.Traffic will be directed to the spoofed system instead of the real system.
B.The spoofed system will receive traffic from any NetBIOS resolution
requests.
C.Traffic will be directed to both the real system and the spoofed system.
,D.The incorrect IP address will be returned during a query from the real
system.
Verified Answer -A.Traffic will be directed to the spoofed system instead
of the real system.
An engineer scans a network for information that can be used in a mock
exploit and discovers that all traffic is not visible on a switch and/or
router. How can the engineer fix this issue? (Select all that apply.)
A.Use port monitoring
B.Use switched port analysis
C.Use an ARP cache
D.Use promiscuous mode
Verified Answer -A.Use port monitoring
B.Use switched port analysis
D.Use promiscuous mode
An organization is hosting a presentation that includes highly
confidential business data. The audience will consist of both external
spectators and company employees. In light of the sensitive nature of the
information being presented, the security team has advised external
spectators against bringing personal or company electronics to the event
and has designated specific seating areas for them. For security purposes,
which of the following rules should external spectators be asked to
comply with? (Select all that apply.)
A.Adhere to the company computer use guidelines.
B.Checking in all mobile devices with the front desk.
C.Remaining in designated areas only.
D.Do not ask the presenter any questions.
Verified Answer -B.Checking in all mobile devices with the front desk.
,C.Remaining in designated areas only.
A PenTest team considers which issue as part of the lessons learned
phase?
A.Client follow-up
B.Mitigation implementation
C.Client acceptance
D.New vulnerabilities
Verified Answer -D.New vulnerabilities
An organization reviews a recommendations report after a successful
PenTest exercise. The cost to mitigate the issue as outlined in the report
will be costly. Which group is the report generated for?
A.Developers
B.Third-party stakeholders
C.C-Suite
D.Technical staff
Verified Answer -C.C-Suite
A security engineer discovers that a malware injection attack has
occurred on a server in a cloud infrastructure. What does the engineer
discover has happened? (Select all that apply.)
A.Malicious code was concealed in a wrapper.
B.A website experienced cross-site scripting.
C.An origin network was identified behind a proxy.
D.The hardware leaked sensitive information.
Verified Answer -A.Malicious code was concealed in a wrapper.
, B.A website experienced cross-site scripting.
A PenTester uses the Nmap utility to scan for a particular host on the
network. Without using any options, what does Nmap provide as a result
to the PenTester? (Select all that apply.)
A.ARP requests
B.SCTP Initiation Ping
C.UDP Ping
D.ICMP type 8
Verified Answer -A.ARP requests
D.ICMP type 8
Address Resolution Protocol (ARP) requests are sent to hosts on the
same local network to obtain Media Access Control (MAC) address
details. The MAC address can be used for purposes such as access
control.
By default, Nmap uses the ICMP Echo Request (ICMP type 8),
especially during host discovery, to determine if hosts are up. This is the
standard method employed for ICMP traffic when no specific options are
set.
A rogue system is suspected to be on a large network. A PenTester uses
the -sY option with the nmap command and should expect what process
to happen?
A.A TCP SYN packet is sent
B.An ICMP type 13 is included
C.A UDP Ping is sent
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller saraciousstuvia. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.09. You're not tied to anything after your purchase.