4.3 Penetration Testing Flashcards

(20 cards)

1
Q

What is penetration testing?

A

A process where we simulate an attack on our own systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does penetration testing differ from vulnerability scanning?

A

Penetration testing involves performing actual exploits to see if access can be gained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do some organizations perform standardized penetration testing?

A

It is a good security best practice and may be mandated by the type of business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What document does NIST provide for an overview of the pen testing process?

A

The Technical Guide to Information Security Testing and Assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the rules of engagement in penetration testing?

A

A formal list of rules that defines the scope and purpose of the testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What might the rules of engagement specify regarding penetration testing timing?

A

They may define appropriate hours for testing, such as after 6:00 PM local time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of penetration tests can be performed?

A

On-site physical breaches, internal penetration tests, and external tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the significance of documenting sensitive information handling in penetration testing?

A

It ensures proper management of sensitive data uncovered during testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should be defined in the rules of engagement regarding systems?

A

Which systems are in scope for testing and which are out of scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary objective of performing a penetration test?

A

To exploit known vulnerabilities to gain access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What risks are associated with exploiting vulnerabilities during penetration testing?

A

The process could cause the system or service to fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some common methods used during penetration testing?

A
  • Buffer overflows * Password brute force attacks * Social engineering * Database injections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a backdoor in the context of penetration testing?

A

A method to gain access to a system again without using the same vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role does a pivot point play after gaining initial access during a penetration test?

A

It allows lateral movement to gain access to other systems within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the common practice after identifying a vulnerability?

A

Reporting it to the software developer for a patch to be created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a CVE?

A

A list of publicly disclosed vulnerabilities.

17
Q

What is the purpose of bug bounties?

A

To reward individuals for finding vulnerabilities in software.

18
Q

What happens after a researcher identifies a vulnerability?

A

The software developer creates a fix and makes it public.

19
Q

Fill in the blank: The process of identifying a vulnerability to the time a patch is available can take _______.

A

weeks or even months.

20
Q

True or False: Penetration testing should always be conducted during business hours.