The CompTIA PenTest+ PT0-003 certification is considered which level of certification for technical professionals performing penetration testing and vulnerability management?
intermediate-level
A penetration tester needs a signed document from the network owner that explicitly identifies the authorized testers and permits the assessment. What document is this?
Authorization to proceed
Define penetration testing.
A simulated cyber attack against a system to identify vulnerabilities.
What does OSINT stand for?
Open Source Intelligence; information gathered from publicly available sources.
True or false: Social engineering relies on human interaction to breach security.
TRUE
Techniques include phishing and pretexting.
Fill in the blank: Nmap is a popular _______ tool.
network scanning
What is the purpose of vulnerability scanning?
To identify and assess security weaknesses in systems.
Define exploit.
A piece of software or code that takes advantage of a vulnerability.
What is a red team?
A group that simulates real-world attacks to test defenses.
True or false: Blue teams are responsible for defending against attacks.
TRUE
They monitor, detect, and respond to threats.
What does CVE stand for?
Common Vulnerabilities and Exposures; a list of publicly known cybersecurity vulnerabilities.
Fill in the blank: Phishing is a type of _______ attack.
social engineering
What is a payload in cybersecurity?
The part of malware that performs the intended malicious action.
Define risk assessment.
The process of identifying and analyzing potential risks to an organization.
What is the purpose of reporting in penetration testing?
To document findings, vulnerabilities, and recommendations for remediation.
True or false: SQL injection is a web application vulnerability.
TRUE
It allows attackers to manipulate database queries.
What does DDoS stand for?
Distributed Denial of Service; an attack that overwhelms a target with traffic.
Fill in the blank: Metasploit is a framework for _______ testing.
penetration
What is social engineering?
Manipulating individuals to gain confidential information or access.
Define network segmentation.
Dividing a network into smaller parts to improve security and performance.
What is the CIA triad?
Confidentiality, Integrity, and Availability; key principles of information security.
True or false: Brute force attacks involve guessing passwords systematically.
TRUE
They can be time-consuming and resource-intensive.
What is a honeypot?
A decoy system designed to attract and trap attackers.
Fill in the blank: Encryption is the process of converting data into _______ format.
secure