Live Virtual Machine Lab 2.1: Module 02 Penetration Testing Techniques
In which of the following tests does the tester not need to have prior knowledge of the system's internal design or features? Black Box Testing Gray Box Testing White Box Testing Red Box Testing
Black Box Testing
Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse? Bug Bounty Enumeration Discovery Vulnerability Mapping
Bug Bounty
Footprinting and gathering information about the target is performed in which phase of penetration testing? Discovery Exploitation Enumeration Vulnerability Mapping
Discovery
Which of the following testing strategies will be performed by a gradual process of gaining access to a network component, infrastructure, or an application layer to minimize detection? Security Assessment Lateral Movement Penetration Testing Security Testing
Lateral Movement
Which of the following terms refers to attacking or taking control of a system through another compromised system? Exploitation Enumeration Vulnerability Mapping Pivoting
Pivoting
Which of the following is a full knowledge penetration testing? Black Box Testing Red Box Testing Gray Box Testing White Box Testing
White Box Testing