Live Virtual Machine Lab 2.1: Module 02 Penetration Testing Techniques

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In which of the following tests does the tester not need to have prior knowledge of the system's internal design or features? Black Box Testing Gray Box Testing White Box Testing Red Box Testing

Black Box Testing

Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse? Bug Bounty Enumeration Discovery Vulnerability Mapping

Bug Bounty

Footprinting and gathering information about the target is performed in which phase of penetration testing? Discovery Exploitation Enumeration Vulnerability Mapping

Discovery

Which of the following testing strategies will be performed by a gradual process of gaining access to a network component, infrastructure, or an application layer to minimize detection? Security Assessment Lateral Movement Penetration Testing Security Testing

Lateral Movement

Which of the following terms refers to attacking or taking control of a system through another compromised system? Exploitation Enumeration Vulnerability Mapping Pivoting

Pivoting

Which of the following is a full knowledge penetration testing? Black Box Testing Red Box Testing Gray Box Testing White Box Testing

White Box Testing


Ensembles d'études connexes

The Uniform Securities Act - Registration

View Set

Chapter 3: Organizational Commitment Assignment Lesson

View Set

V + ment = N (English Plus 3; Unit 1)

View Set

3 - 7 Unfair Claim Settlement Practices by Insurers

View Set

Chapter 15 Documentation and communication in the healthcare team

View Set

Saud NCLEX-Adult Health Endocrine

View Set

video and broadcast camera review

View Set

Chapter 65: Assessment of Neurologic Function

View Set