Live Virtual Machine Lab 2.1: Module 02 Penetration Testing Techniques

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Discovery

Footprinting and gathering information about the target is performed in which phase of penetration testing?

Black Box Testing

In which of the following tests does the tester not need to have prior knowledge of the system's internal design or features?

Bug Bounty

Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse?

White Box Testing

Which of the following is a full knowledge penetration testing?

Pivoting

Which of the following terms refers to attacking or taking control of a system through another compromised system?

Penetration Testing

Which of the following testing strategies will be performed by a gradual process of gaining access to a network component, infrastructure, or an application layer to minimize detection?


Set pelajaran terkait

Chapter 1: The Nurse's Role in a Changing Maternal-Child Health Care Environment

View Set

Product Design Ch 15 - Robust Design

View Set

Ethics Exam, Ethics I Exam - Amy's

View Set

Photosynthesis and Cellular Respiration

View Set

English Composition Ch. 1-3 Quiz

View Set

Elements of Prose Literature & Poetry

View Set

Chapters 1-14 Implementing & Supporting COS flashcards (Microsoft Windows 10 Configuring Windows Devices)

View Set