2.5.7 Practice Questions2.3.4 Practice Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following best describes a non-disclosure agreement?

A common legal contract outlining confidential material that will be shared during the assessment.

Which of the following best describes a master service agreement?

A contract where parties agree to the terms that will govern future actions.

Heather is working for a cybersecurity firm based in Florida. She will be conducting a remote penetration test for her client, who is based in Utah. Which state's laws and regulations will she need to adhere to?

A lawyer should be consulted on which laws to adhere to and both parties agree.

Hannah is working on the scope of work with her client. During the planning, she discovers that some of the servers are cloud-based servers. Which of the following should she do?

Add the cloud host to the scope of work.

Which of the following best describes the Wassenaar Arrangement?

An agreement between 41 countries to enforce similar export controls for weapons, including intrusion software.

Yesenia was recently terminated from her position, where she was using her personal cell phone for business purposes. Upon termination, her phone was remotely wiped. Which of the following corporate policies allows this action?

BYOD policy

What are the rules and regulations defined and put in place by an organization called?

Corporate policies

Which of the following best describes the rules of engagement document?

Defines if the test will be a white box, gray box, or black box test and how to handle sensitive data.

United States Code Title 18, Chapter 47, Section 1029 deals with which of the following?

Fraud and related activity involving access devices.

During an authorized penetration test, Michael discovered his client's financial records. Which of the following should he do?

Ignore the records and move on.

During a penetration test, Mitch discovers the following on a client's computer. Instructions for creating a bomb Emails threatening a public official Maps to the officials home and office Which of the following actions should he take?

Immediately stop the test and report the finding to the authorities.

Which of the following is a common corporate policy that would be reviewed during a penetration test?

Password policy

During a penetration test, Dylan is caught testing the physical security. Which document should Dylan have on his person to avoid being arrested?

Permission to test

During a penetration test, Heidi runs into an ethical situation she's never faced before and is unsure how to proceed. Which of the following should she do?

Reach out to an attorney for legal advice.

Which of the following policies would cover what you should do in case of a data breach?

Sensitive data handling policy


Conjuntos de estudio relacionados

Econ 201 Chapter 20: Market Inequality

View Set

Chapter 11: Antepartum Period (Test)

View Set

Bacteriology & Virology Final Quarter 3

View Set

Psychiatric-Mental Health Practice Exam HESI

View Set

psych 101 final study guide ch. 8, 10,11,12,13

View Set

Practical Research (Set 1): What is Research?

View Set