CompTIA PenTest Flashcards

Review (29 cards)

1
Q

The CompTIA PenTest+ PT0-003 certification is considered which level of certification for technical professionals performing penetration testing and vulnerability management?

A

intermediate-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A penetration tester needs a signed document from the network owner that explicitly identifies the authorized testers and permits the assessment. What document is this?

A

Authorization to proceed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define penetration testing.

A

A simulated cyber attack against a system to identify vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does OSINT stand for?

A

Open Source Intelligence; information gathered from publicly available sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: Social engineering relies on human interaction to breach security.

A

TRUE

Techniques include phishing and pretexting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: Nmap is a popular _______ tool.

A

network scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of vulnerability scanning?

A

To identify and assess security weaknesses in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define exploit.

A

A piece of software or code that takes advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a red team?

A

A group that simulates real-world attacks to test defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false: Blue teams are responsible for defending against attacks.

A

TRUE

They monitor, detect, and respond to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does CVE stand for?

A

Common Vulnerabilities and Exposures; a list of publicly known cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Phishing is a type of _______ attack.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a payload in cybersecurity?

A

The part of malware that performs the intended malicious action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define risk assessment.

A

The process of identifying and analyzing potential risks to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of reporting in penetration testing?

A

To document findings, vulnerabilities, and recommendations for remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: SQL injection is a web application vulnerability.

A

TRUE

It allows attackers to manipulate database queries.

17
Q

What does DDoS stand for?

A

Distributed Denial of Service; an attack that overwhelms a target with traffic.

18
Q

Fill in the blank: Metasploit is a framework for _______ testing.

19
Q

What is social engineering?

A

Manipulating individuals to gain confidential information or access.

20
Q

Define network segmentation.

A

Dividing a network into smaller parts to improve security and performance.

21
Q

What is the CIA triad?

A

Confidentiality, Integrity, and Availability; key principles of information security.

22
Q

True or false: Brute force attacks involve guessing passwords systematically.

A

TRUE

They can be time-consuming and resource-intensive.

23
Q

What is a honeypot?

A

A decoy system designed to attract and trap attackers.

24
Q

Fill in the blank: Encryption is the process of converting data into _______ format.

25
What is **two-factor authentication** (2FA)?
A security process requiring two forms of verification to access an account.
26
Define **zero-day vulnerability**.
A flaw that is exploited before the vendor releases a fix.
27
What is the role of a **security policy**?
To outline an organization's security requirements and protocols.
28
True or false: **Malware** can include viruses, worms, and ransomware.
TRUE ## Footnote All are types of malicious software.
29
What is **credential stuffing**?
Using stolen credentials to gain unauthorized access to accounts.