Live Virtual Machine Lab 2.1: Module 02 Penetration Testing Techniques
Discovery
Footprinting and gathering information about the target is performed in which phase of penetration testing?
Black Box Testing
In which of the following tests does the tester not need to have prior knowledge of the system's internal design or features?
Bug Bounty
Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse?
White Box Testing
Which of the following is a full knowledge penetration testing?
Pivoting
Which of the following terms refers to attacking or taking control of a system through another compromised system?
Lateral Movement
Which of the following testing strategies will be performed by a gradual process of gaining access to a network component, infrastructure, or an application layer to minimize detection?