A. Nmap
B. Nessus
C. Metasploit
D. lsof
Answer: A
Nmap is a network discovery scanning tool that reports the open ports on a remote system.
A. 80/open
B. 22/filtered
C. 443/open
D. 1433/open
Answer: D
Only open ports represent potentially significant security risks. Ports 80 and 443 are expected to be open on a web server. Port 1433 is a database port and should never be exposed to an external network.
A. Sensitivity of the information stored on the system
B. Difficulty of performing the test
C. Desire to experiment with new testing tools
D. Desirability of the system to attackers
Answer: C
The sensitivity of information stored on the system, difficulty of performing the test, and likelihood of an attacker targeting the system are all valid considerations when planning a security testing schedule. The desire to experiment with new testing tools should not influence the production testing schedule.
A. Vulnerability scan
B. Risk assessment
C. Mitigation of vulnerabilities
D. Threat assessment
Answer: C
Security assessments include many types of tests designed to identify vulnerabilities, and the assessment report normally includes recommendations for mitigation. The assessment does not, however, include actual mitigation of those vulnerabilities.
A. Management
B. Security auditor
C. Security professional
D. Customers
Answer: A
Security assessment reports should be addressed to the organization’s management. For this reason, they should be written in plain English and avoid technical jargon.
A. 10.0.0.0/0
B. 10.0.0.0/8
C. 10.0.0.0/16
D. 10.0.0.0/24
Answer: B
The use of an 8-bit subnet mask means that the first octet of the IP address represents the network address. In this case, that means 10.0.0.0/8 will scan any IP address beginning with 10.
A. SSH
B. Web browser
C. telnet
D. ping
Answer: B
The server is likely running a website on port 80. Using a web browser to access the site may provide important information about the site’s purpose.
A. 20
B. 22
C. 25
D. 80
Answer: B
The SSH protocol uses port 22 to accept administrative connections to a server.
A. Unauthenticated scan
B. Port scan
C. Half-open scan
D. Authenticated scan
Answer: D
Authenticated scans can read configuration information from the target system and reduce the instances of false positive and false negative reports.
A. TCP connect scan
B. Xmas scan
C. TCP SYN scan
D. TCP ACK scan
Answer: C
The TCP SYN scan sends a SYN packet and receives a SYN ACK packet in response, but it does not send the final ACK required to complete the three-way handshake.
A. Port scanner
B. Network vulnerability scanner
C. Network discovery scanner
D. Web vulnerability scanner
Answer: D
SQL injection attacks are web vulnerabilities, and Matthew would be best served by a web vulnerability scanner. A network vulnerability scanner might also pick up this vulnerability, but the web vulnerability scanner is specifically designed for the task and more likely to be successful.
A. Only if the application changes
B. At least monthly
C. At least annually
D. There is no rescanning requirement.
Answer: C
PCI DSS requires that Badin rescan the application at least annually and after any change in the application.
A. nmap
B. Metasploit
C. Nessus
D. Snort
Answer: B
Metasploit is an automated exploit tool that allows attackers to easily execute common attack techniques.
A. Code review
B. Application vulnerability review
C. Mutation fuzzing
D. Generational fuzzing
Answer: C
Mutation fuzzing uses bit flipping and other techniques to slightly modify previous inputs to a program in an attempt to detect software flaws.
A. Misuse case testing
B. SQL injection testing
C. Fuzzing
D. Code review
Answer: A
Misuse case testing identifies known ways that an attacker might exploit a system and tests explicitly to see if those attacks are possible in the proposed code.
A. Application programming interface testing
B. User interface testing
C. Physical interface testing
D. Security interface testing
Answer: B
User interface testing includes assessments of both graphical user interfaces (GUIs) and command-line interfaces (CLIs) for a software program.
A. Black box penetration test
B. White box penetration test
C. Gray box penetration test
D. Red box penetration test
Answer: B
During a white box penetration test, the testers have access to detailed configuration information about the system being tested.
A. 22
B. 80
C. 143
D. 443
Answer: B
Unencrypted HTTP communications take place over TCP port 80 by default.
A. Inspection
B. Rework
C. Follow-up
D. None of the above
Answer: C
The Fagin inspection process concludes with the follow-up phase.
A. Account management
B. Backup verification
C. Log review
D. Key performance indicators
Answer: B
The backup verification process ensures that backups are running properly and thus meeting the organization’s data protection objectives.