1What is the primary objective of the Planning and Scoping phase in penetration testing?
A.To exploit known vulnerabilities in the target system
B.To define the rules of engagement, objectives, and boundaries of the test
C.To generate the final report for the stakeholders
D.To perform active scanning of the network perimeter
Correct Answer: To define the rules of engagement, objectives, and boundaries of the test
Explanation:Planning and Scoping is the initial phase where the tester and the client agree upon the objectives, scope, Rules of Engagement (RoE), and legal constraints before any technical activity begins.
Incorrect! Try again.
2Which of the following best describes a Black Box penetration test?
A.The tester has full knowledge of the network infrastructure and source code
B.The tester works alongside the internal security team to audit systems
C.The tester has zero prior knowledge of the target system, simulating an external attacker
D.The tester has partial knowledge, such as user credentials but no network diagrams
Correct Answer: The tester has zero prior knowledge of the target system, simulating an external attacker
Explanation:A Black Box test simulates a real-world attack where the ethical hacker has no internal information about the target organization.
Incorrect! Try again.
3In the context of the CIA Triad, penetration testing primarily seeks to ensure that security controls maintain:
A.Cost, Insurance, and Assessment
B.Confidentiality, Integrity, and Availability
C.Control, Identity, and Authorization
D.Compliance, Inspection, and Auditing
Correct Answer: Confidentiality, Integrity, and Availability
Explanation:The CIA Triad stands for Confidentiality, Integrity, and Availability. Penetration testing evaluates how well a system protects these three pillars of information security.
Incorrect! Try again.
4Which document is essential to obtain before starting any penetration testing activities to avoid legal liability?
A.Service Level Agreement (SLA)
B.Vulnerability Scan Report
C.Written Authorization (Get Out of Jail Free card)
D.Software License Agreement
Correct Answer: Written Authorization (Get Out of Jail Free card)
Explanation:Written authorization from the system owner is mandatory to distinguish penetration testing from illegal hacking. It is often colloquially called a "Get Out of Jail Free" card.
Incorrect! Try again.
5In a White Box penetration test, which of the following is typically provided to the tester?
A.Only the company name
B.Network diagrams, source code, and IP addressing schemes
C.Only a URL to the public website
D.Physical access badges only
Correct Answer: Network diagrams, source code, and IP addressing schemes
Explanation:White Box testing (or Crystal Box) involves providing the tester with full details of the system to ensure comprehensive coverage, including internal logic and configurations.
Incorrect! Try again.
6What distinguishes a Vulnerability Assessment from a Penetration Test?
A.Vulnerability assessments are manual; penetration tests are automated
B.Vulnerability assessments identify potential flaws; penetration tests attempt to exploit them to verify risk
C.Vulnerability assessments take longer to complete than penetration tests
D.There is no difference; the terms are interchangeable
Correct Answer: Vulnerability assessments identify potential flaws; penetration tests attempt to exploit them to verify risk
Explanation:A vulnerability assessment lists potential weaknesses (often automated), whereas a penetration test actively exploits those weaknesses to understand the depth and impact of the breach.
Incorrect! Try again.
7Which regulatory standard applies specifically to organizations handling credit card information?
A.HIPAA
B.GDPR
C.PCI-DSS
D.FERPA
Correct Answer: PCI-DSS
Explanation:The Payment Card Industry Data Security Standard (PCI-DSS) mandates security testing, including penetration testing, for organizations that process, store, or transmit credit card data.
Incorrect! Try again.
8According to the PTES (Penetration Testing Execution Standard), which phase immediately follows Pre-engagement Interactions?
A.Exploitation
B.Reporting
C.Intelligence Gathering
D.Post-Exploitation
Correct Answer: Intelligence Gathering
Explanation:After Pre-engagement Interactions (Planning/Scoping), the PTES methodology moves to Intelligence Gathering (Reconnaissance) to collect data about the target.
Incorrect! Try again.
9What is the purpose of the Rules of Engagement (RoE) document?
A.To list the specific exploits that will be used
B.To define how the test will be conducted, constraints, timeline, and communication channels
C.To detail the cost and payment terms of the contract
D.To report the findings of the test after completion
Correct Answer: To define how the test will be conducted, constraints, timeline, and communication channels
Explanation:The RoE establishes the logistics, boundaries, and permissible actions during the test to ensure safety and alignment with organizational goals.
Incorrect! Try again.
10Which of the following implies a Gray Box testing approach?
A.The tester has Administrator access to all servers
B.The tester has no knowledge of the system
C.The tester acts as an authenticated user with limited knowledge of the backend
D.The tester audits the physical security of the building only
Correct Answer: The tester acts as an authenticated user with limited knowledge of the backend
Explanation:Gray Box testing strikes a balance, giving the tester partial knowledge (like user credentials) to simulate an insider threat or an attacker who has breached the perimeter.
Incorrect! Try again.
11When defining Scope, what does the term "Out-of-Scope" refer to?
A.Systems that have critical vulnerabilities
B.Assets or systems that must explicitly not be tested or touched
C.Tools that the tester is not allowed to use
D.Vulnerabilities that cannot be patched
Correct Answer: Assets or systems that must explicitly not be tested or touched
Explanation:Out-of-Scope assets are those the client has excluded from the test to prevent downtime, legal issues, or because they belong to third parties.
Incorrect! Try again.
12Which type of team is responsible for defending the network during a penetration test exercise?
A.Red Team
B.Blue Team
C.White Team
D.Purple Team
Correct Answer: Blue Team
Explanation:The Blue Team is the internal security staff responsible for monitoring, detecting, and responding to the attacks generated by the Red Team (testers).
Incorrect! Try again.
13What is a Purple Team exercise?
A.A test conducted strictly by government auditors
B.A collaborative effort where Red and Blue teams work together to improve detection and defense
C.A physical security assessment combined with social engineering
D.A test focused solely on wireless networks
Correct Answer: A collaborative effort where Red and Blue teams work together to improve detection and defense
Explanation:Purple Teaming involves knowledge sharing between attackers (Red) and defenders (Blue) to maximize the learning outcome and improve security posture instantly.
Incorrect! Try again.
14In the context of Risk Management, how is Risk typically calculated conceptually?
A.
B.
C.
D.
Correct Answer:
Explanation:Risk is commonly defined as the likelihood of a Threat exploiting a Vulnerability resulting in a specific Impact to the organization.
Incorrect! Try again.
15Which standard is specifically known as the Open Source Security Testing Methodology Manual?
A.OSSTMM
B.NIST SP 800-115
C.ISO 27001
D.OWASP
Correct Answer: OSSTMM
Explanation:OSSTMM is a peer-reviewed methodology for security testing that focuses on operational security and metrics.
Incorrect! Try again.
16Why is Passive Reconnaissance preferred in the early stages of a stealthy penetration test?
A.It generates a large amount of network traffic
B.It involves direct interaction with the target system
C.It relies on public information and does not alert the target's IDS/IPS
D.It exploits vulnerabilities immediately
Correct Answer: It relies on public information and does not alert the target's IDS/IPS
Explanation:Passive reconnaissance involves gathering info from public sources (OSINT) without sending packets to the target, thus avoiding detection.
Incorrect! Try again.
17What is a critical Environmental Consideration when planning a penetration test on a SCADA or Industrial Control System (ICS)?
A.These systems handle high-speed video streaming
B.These systems are usually robust and can handle heavy scanning traffic
C.These systems are often fragile; active scanning may cause physical damage or safety hazards
D.These systems are always connected to the internet
Correct Answer: These systems are often fragile; active scanning may cause physical damage or safety hazards
Explanation:SCADA/ICS environments often use legacy hardware where standard network scanning can cause latency or crashes, leading to real-world physical safety risks.
Incorrect! Try again.
18Which US regulation requires healthcare organizations to secure Protected Health Information (PHI)?
A.SOX
B.HIPAA
C.FISMA
D.GLBA
Correct Answer: HIPAA
Explanation:The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data.
Incorrect! Try again.
19During the Scoping phase, why is it important to identify Third-Party providers (e.g., Cloud hosts, ISPs)?
A.To ask them for free software
B.To ensure they are ignored completely
C.To obtain necessary permission, as testing their infrastructure without consent is illegal
D.To hack them instead of the client
Correct Answer: To obtain necessary permission, as testing their infrastructure without consent is illegal
Explanation:If a client's data sits on AWS, Azure, or a managed ISP, the tester typically needs to ensure the testing falls within the provider's acceptable use policy or obtain specific authorization.
Incorrect! Try again.
20What is the NIST Special Publication that acts as a Technical Guide to Information Security Testing and Assessment?
A.NIST SP 800-53
B.NIST SP 800-115
C.NIST SP 800-30
D.NIST SP 800-37
Correct Answer: NIST SP 800-115
Explanation:NIST SP 800-115 provides guidelines for planning and conducting technical information security testing and assessments.
Incorrect! Try again.
21Which test type focuses on the human element of security?
A.Social Engineering
B.Network Sniffing
C.SQL Injection
D.Buffer Overflow
Correct Answer: Social Engineering
Explanation:Social Engineering involves manipulating people into divulging confidential information or performing actions that compromise security.
Incorrect! Try again.
22In the context of scoping, what is a Blackout Window?
A.A period when the power is turned off
B.A specific time period where no testing is allowed due to critical business operations
C.A tool used to block network traffic
D.The time when Black Box testing is conducted
Correct Answer: A specific time period where no testing is allowed due to critical business operations
Explanation:A Blackout Window is defined in the schedule to prevent testing during high-traffic or critical business hours (e.g., end-of-quarter processing).
Incorrect! Try again.
23What is the main advantage of an Internal penetration testing team?
A.They are cheaper than automated tools
B.They have deep contextual knowledge of the organization's culture and systems
C.They bring a completely unbiased external perspective
D.They do not require any rules of engagement
Correct Answer: They have deep contextual knowledge of the organization's culture and systems
Explanation:Internal teams understand the business context and network intimately, allowing for continuous testing, though they may lack the fresh perspective of external consultants.
Incorrect! Try again.
24Which phase involves cleaning up artifacts, removing user accounts created during the test, and restoring settings?
A.Pre-engagement
B.Reconnaissance
C.Post-Exploitation / Restoration
D.Vulnerability Mapping
Correct Answer: Post-Exploitation / Restoration
Explanation:After the test, the environment must be restored to its original state to prevent leaving backdoors or clutter that could be exploited by real attackers.
Incorrect! Try again.
25Which organization manages the Common Vulnerability Scoring System (CVSS)?
A.FIRST.org
B.NSA
C.FBI
D.Google
Correct Answer: FIRST.org
Explanation:The Forum of Incident Response and Security Teams (FIRST) maintains the CVSS, a free and open industry standard for assessing the severity of computer system security vulnerabilities.
Incorrect! Try again.
26If a client requests a penetration test but forbids the use of automated scanners to prevent noise, this constraint is part of:
A.The invoice
B.The Rules of Engagement (RoE)
C.The CVSS score
D.The Post-Mortem
Correct Answer: The Rules of Engagement (RoE)
Explanation:Restrictions on tools and techniques are explicitly defined in the Rules of Engagement.
Incorrect! Try again.
27Which of the following is an example of Open Source Intelligence (OSINT)?
A.Scanning the target's firewall ports
B.Looking up employee email addresses on LinkedIn
C.Cracking the Wi-Fi password
D.Intercepting internal phone calls
Correct Answer: Looking up employee email addresses on LinkedIn
Explanation:OSINT involves gathering data from publicly available sources (like social media, WHOIS records, search engines) without engaging the target systems.
Incorrect! Try again.
28What is the difference between Production and Staging environments in the context of scoping?
A.Production is live data; Staging is a replica for testing
B.Production is for developers; Staging is for customers
C.Staging is more secure than Production
D.There is no difference
Correct Answer: Production is live data; Staging is a replica for testing
Explanation:Clients often prefer testing on a Staging (test) environment to avoid crashing the live (Production) system, though Staging may not perfectly mirror Production security controls.
Incorrect! Try again.
29Which legal concept requires the pentester to keep client findings secret?
A.Indemnification Clause
B.Non-Disclosure Agreement (NDA)
C.Statement of Work (SOW)
D.Chain of Custody
Correct Answer: Non-Disclosure Agreement (NDA)
Explanation:An NDA is a legal contract that outlines confidential material, knowledge, or information that the parties wish to share with one another but restrict access to third parties.
Incorrect! Try again.
30In the OWASP Top 10, what does OWASP stand for?
A.Open Web Application Security Project
B.Official Wireless Access Security Protocol
C.Online Wide Assessment of Security Procedures
D.Organization for Web Authentication and Security Pentesters
Correct Answer: Open Web Application Security Project
Explanation:OWASP is a nonprofit foundation that works to improve the security of software, famous for its Top 10 list of web application vulnerabilities.
Incorrect! Try again.
31What is the primary goal of Physical Penetration Testing?
A.To test the firewall throughput
B.To access the facility, server room, or workstations physically to compromise security
C.To check if the air conditioning is working
D.To ensure the website loads fast
Correct Answer: To access the facility, server room, or workstations physically to compromise security
Explanation:Physical pentesting evaluates physical security controls like locks, cameras, guards, and badges.
Incorrect! Try again.
32Which term describes a limitation where the tester cannot perform Denial of Service (DoS) attacks?
A.Scope Creep
B.Rules of Engagement Constraint
C.White Box Requirement
D.Compliance Failure
Correct Answer: Rules of Engagement Constraint
Explanation:Prohibiting DoS attacks is a standard constraint in the Rules of Engagement to ensure business continuity.
Incorrect! Try again.
33During the planning phase, defining Communication Paths ensures:
A.The tester can blog about the findings
B.The client knows who to contact if the test causes a critical outage
C.The tester can ask the client for passwords
D.The media is informed of the test
Correct Answer: The client knows who to contact if the test causes a critical outage
Explanation:Establishing emergency contacts and escalation paths is vital so issues can be resolved immediately if testing disrupts operations.
Incorrect! Try again.
34What is Scope Creep?
A.A type of slow network scan
B.The gradual expansion of the project's goals or boundaries beyond the original agreement
C.A method of physical entry
D.The process of analyzing results
Correct Answer: The gradual expansion of the project's goals or boundaries beyond the original agreement
Explanation:Scope creep occurs when unauthorized or unplanned changes to the testing scope are added without adjusting the timeline, budget, or authorization.
Incorrect! Try again.
35Which testing methodology focuses heavily on the business logic and data flow?
A.Network Layer Testing
B.Application Logic Testing
C.Wireless Testing
D.Physical Testing
Correct Answer: Application Logic Testing
Explanation:Application testing focuses on how the application handles data and logic, looking for flaws like business logic errors, rather than just infrastructure faults.
Incorrect! Try again.
36ISO/IEC 27001 is a standard for:
A.Information Security Management Systems (ISMS)
B.Payment Card Processing
C.Medical Record Storage
D.Wireless Encryption
Correct Answer: Information Security Management Systems (ISMS)
Explanation:ISO 27001 is the international standard that sets out the specification for an information security management system (ISMS).
Incorrect! Try again.
37In a Double-Blind test:
A.Both the tester and the client know everything
B.The tester knows nothing, and the client's security team is unaware of the test
C.Two testers work simultaneously
D.The test is done twice
Correct Answer: The tester knows nothing, and the client's security team is unaware of the test
Explanation:Double-blind tests simulate a real attack most accurately because the defenders (Blue Team) are not warned, testing their genuine reaction time and procedures.
Incorrect! Try again.
38What is the Statement of Work (SOW)?
A.A list of vulnerabilities found
B.A formal document defining the timeline, deliverables, and payment for the project
C.A code snippet used for exploitation
D.A manual for the testing software
Correct Answer: A formal document defining the timeline, deliverables, and payment for the project
Explanation:The SOW acts as the contract outlining the specific work to be performed, timelines, and business arrangements.
Incorrect! Try again.
39If a pentester discovers evidence of a previous, ongoing criminal compromise during a test, what should they do?
A.Delete the evidence to clean the system
B.Hack the criminal back
C.Stop the test immediately and notify the client's point of contact
D.Include it in the final report next month
Correct Answer: Stop the test immediately and notify the client's point of contact
Explanation:Finding an actual breach requires immediate cessation of testing to preserve the chain of custody and allow the client to initiate Incident Response.
Incorrect! Try again.
40Which of the following is an example of Active Reconnaissance?
A.Browsing the company website
B.Searching WHOIS records
C.Port scanning using Nmap
D.Reading employee blogs
Correct Answer: Port scanning using Nmap
Explanation:Active reconnaissance involves sending data packets to the target system (scanning) which interacts with the target's infrastructure and can be detected.
Incorrect! Try again.
41What does FEDRAMP standardize?
A.Credit Card processing fees
B.Security assessment and authorization for cloud products used by US federal agencies
C.European data privacy
D.Password complexity rules
Correct Answer: Security assessment and authorization for cloud products used by US federal agencies
Explanation:The Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security assessment for cloud service offerings used by the US government.
Incorrect! Try again.
42Which scanning type identifies open ports and services?
A.Vulnerability Scanning
B.Port Scanning
C.Social Engineering
D.Phishing
Correct Answer: Port Scanning
Explanation:Port scanning (enumeration) identifies which ports are open and what services are listening on them.
Incorrect! Try again.
43In the context of the Cyber Kill Chain, which phase corresponds to the actual execution of malicious code on the target?
A.Reconnaissance
B.Weaponization
C.Exploitation
D.Actions on Objectives
Correct Answer: Exploitation
Explanation:The Exploitation phase involves triggering the weaponized code against a vulnerability to gain access.
Incorrect! Try again.
44Why is Shodan a relevant tool in the planning phase?
A.It cracks passwords
B.It is a search engine for Internet-connected devices
C.It generates reports
D.It is a virus scanner
Correct Answer: It is a search engine for Internet-connected devices
Explanation:Shodan allows testers to find devices (servers, cameras, IoT) belonging to the organization that are exposed to the internet, aiding in reconnaissance.
Incorrect! Try again.
45What is Lateral Movement?
A.Moving physically from one office to another
B.Moving deeper into a network from a compromised host to access other resources
C.Exfiltrating data out of the network
D.Escalating privileges on a single machine
Correct Answer: Moving deeper into a network from a compromised host to access other resources
Explanation:Lateral movement is the technique of using a compromised system to attack other systems within the same network.
Incorrect! Try again.
46A Targeted Testing approach generally means:
A.The IT team and the pentester work together to test a specific system
B.Random testing of all systems
C.Testing only on weekends
D.Testing without any authorization
Correct Answer: The IT team and the pentester work together to test a specific system
Explanation:Targeted testing (often also called 'lights-on' approach) keeps the IT team informed so they can monitor the specific attack vectors being tested.
Incorrect! Try again.
47Which of the following represents a Technical constraint in scoping?
A.Budget limitations
B.Legal restrictions
C.Bandwidth limitations or unstable network connections
D.Holiday schedules
Correct Answer: Bandwidth limitations or unstable network connections
Explanation:Technical constraints relate to the hardware/software environment, such as limited bandwidth preventing high-speed scanning.
Incorrect! Try again.
48What is the primary focus of GDPR compliance testing?
A.Protecting US Government Data
B.Protecting the privacy and personal data of EU citizens
C.Ensuring credit card transactions are fast
D.Securing medical devices
Correct Answer: Protecting the privacy and personal data of EU citizens
Explanation:The General Data Protection Regulation (GDPR) focuses on data protection and privacy for individuals within the European Union.
Incorrect! Try again.
49When is the Chain of Custody relevant in penetration testing?
A.When ordering lunch
B.When handling physical evidence or forensic data found during a test
C.When writing the invoice
D.When scheduling the test
Correct Answer: When handling physical evidence or forensic data found during a test
Explanation:Chain of Custody documents who held, handled, or transferred evidence to ensure it remains admissible in legal proceedings if a crime is discovered.
Incorrect! Try again.
50Mathematically, in the CVSS v3.1 equations, the Base Score is a function of:
A.
B.
C.
D.
Correct Answer:
Explanation:The CVSS Base Score is derived from metrics representing the Exploitability (how easy it is to hack) and the Impact (consequences to CIA).