Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following techniques is considered passive reconnaissance? Port scans Vulnerability scanning WHOIS lookups Footprinting

WHOIS lookups

Taylor is conducting a penetration test and deploys a toolkit on a compromised system which is then used to gain access to other systems. What term best describes Taylor's activity? OSINT Lateral Movement Privilege Escalation Footprinting

Lateral movement

Terry identified a new security vulnerability and computed its CVSS base score as 3.5. Which risk category would this vulnerability fall into? Low Medium High Critical

Low

Sam has detected lateral network traffic that is not compliant with the organization's security policy creating a belief that a cybersecurity compromise has already occurred. Sam decides to search for evidence of the compromise, which type of security assessment technique should Sam utilize? Vulnerability scanning Penetration testing Threat huntiung War driving

Threat hunting

Which of the following controls will NOT affect scan results? Firewall settings Network segmentation Audit requirements Intrusion Detection System (IDS)

Audit Requirements

Mackenzie was offered an on-the-job training opportunity that includes defending the organization's systems from attack as part of a security training exercise. What role is Mackenzie playing in this exercise? Red Team blue Team Orange Team White Team

Blue Team

Lilo is conducting a penetration test for a client. The client provided Lilo with limited but important information on the configuration of the systems under test. What type of pentest is Lilo performing? Gray-box test Red-box test White-box test Black-box test

Gray-box test

Kelly installs a backdoor in a database server that was exploited as part of a penetration test which will provide ongoing access to the server in the future. Which term describes this action? Lateral movement Privilege escalation Maneuver Persistence

Persistence

Which of the CVSS metrics would contain information about the difficulty of exploiting the vulnerability? AV C PR AC

AC

Calculate the impact sub-score (ISS) given the following CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N 0.24 0.56 0.44 0.92

0.56 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Attack Vector: Network (score: 0.85) Attack Complexity: Low (score: 0.77) Privileges Required: None (score: 0.85) User Interaction: None (score: 0.85) Scope: Unchanged Confidentiality: High (score: 0.56) Integrity: None (score: 0.00) Availability: None (score: 0.00) ISS = 1 - [(1 - Confidentiality) x (1-Integrity) x (1-Availability)] ISS = 1 - [(1-0.56) x (1-0) x (1-0)] = .56


Ensembles d'études connexes

Macroeconomics chapters 7,8 and 10

View Set

Crossroads Chapter 4: The Napoleonic Era

View Set

Немецкие идиомы и их русские аналоги

View Set