Unit 1 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary objective of the Planning and Scoping phase in penetration testing?

A. To define the rules of engagement, objectives, and boundaries of the test
B. To exploit known vulnerabilities in the target system
C. To perform active scanning of the network perimeter
D. To generate the final report for the stakeholders

2 Which of the following best describes a Black Box penetration test?

A. The tester has partial knowledge, such as user credentials but no network diagrams
B. The tester has full knowledge of the network infrastructure and source code
C. The tester works alongside the internal security team to audit systems
D. The tester has zero prior knowledge of the target system, simulating an external attacker

3 In the context of the CIA Triad, penetration testing primarily seeks to ensure that security controls maintain:

A. Cost, Insurance, and Assessment
B. Compliance, Inspection, and Auditing
C. Confidentiality, Integrity, and Availability
D. Control, Identity, and Authorization

4 Which document is essential to obtain before starting any penetration testing activities to avoid legal liability?

A. Software License Agreement
B. Vulnerability Scan Report
C. Written Authorization (Get Out of Jail Free card)
D. Service Level Agreement (SLA)

5 In a White Box penetration test, which of the following is typically provided to the tester?

A. Network diagrams, source code, and IP addressing schemes
B. Only the company name
C. Physical access badges only
D. Only a URL to the public website

6 What distinguishes a Vulnerability Assessment from a Penetration Test?

A. Vulnerability assessments are manual; penetration tests are automated
B. Vulnerability assessments take longer to complete than penetration tests
C. There is no difference; the terms are interchangeable
D. Vulnerability assessments identify potential flaws; penetration tests attempt to exploit them to verify risk

7 Which regulatory standard applies specifically to organizations handling credit card information?

A. PCI-DSS
B. GDPR
C. HIPAA
D. FERPA

8 According to the PTES (Penetration Testing Execution Standard), which phase immediately follows Pre-engagement Interactions?

A. Post-Exploitation
B. Reporting
C. Intelligence Gathering
D. Exploitation

9 What is the purpose of the Rules of Engagement (RoE) document?

A. To list the specific exploits that will be used
B. To report the findings of the test after completion
C. To define how the test will be conducted, constraints, timeline, and communication channels
D. To detail the cost and payment terms of the contract

10 Which of the following implies a Gray Box testing approach?

A. The tester acts as an authenticated user with limited knowledge of the backend
B. The tester has Administrator access to all servers
C. The tester has no knowledge of the system
D. The tester audits the physical security of the building only

11 When defining Scope, what does the term "Out-of-Scope" refer to?

A. Vulnerabilities that cannot be patched
B. Assets or systems that must explicitly not be tested or touched
C. Systems that have critical vulnerabilities
D. Tools that the tester is not allowed to use

12 Which type of team is responsible for defending the network during a penetration test exercise?

A. White Team
B. Red Team
C. Purple Team
D. Blue Team

13 What is a Purple Team exercise?

A. A test focused solely on wireless networks
B. A collaborative effort where Red and Blue teams work together to improve detection and defense
C. A physical security assessment combined with social engineering
D. A test conducted strictly by government auditors

14 In the context of Risk Management, how is Risk typically calculated conceptually?

A.
B.
C.
D.

15 Which standard is specifically known as the Open Source Security Testing Methodology Manual?

A. NIST SP 800-115
B. OWASP
C. ISO 27001
D. OSSTMM

16 Why is Passive Reconnaissance preferred in the early stages of a stealthy penetration test?

A. It generates a large amount of network traffic
B. It relies on public information and does not alert the target's IDS/IPS
C. It involves direct interaction with the target system
D. It exploits vulnerabilities immediately

17 What is a critical Environmental Consideration when planning a penetration test on a SCADA or Industrial Control System (ICS)?

A. These systems are often fragile; active scanning may cause physical damage or safety hazards
B. These systems are usually robust and can handle heavy scanning traffic
C. These systems handle high-speed video streaming
D. These systems are always connected to the internet

18 Which US regulation requires healthcare organizations to secure Protected Health Information (PHI)?

A. GLBA
B. HIPAA
C. FISMA
D. SOX

19 During the Scoping phase, why is it important to identify Third-Party providers (e.g., Cloud hosts, ISPs)?

A. To ensure they are ignored completely
B. To hack them instead of the client
C. To ask them for free software
D. To obtain necessary permission, as testing their infrastructure without consent is illegal

20 What is the NIST Special Publication that acts as a Technical Guide to Information Security Testing and Assessment?

A. NIST SP 800-30
B. NIST SP 800-37
C. NIST SP 800-53
D. NIST SP 800-115

21 Which test type focuses on the human element of security?

A. Social Engineering
B. Network Sniffing
C. Buffer Overflow
D. SQL Injection

22 In the context of scoping, what is a Blackout Window?

A. A period when the power is turned off
B. A specific time period where no testing is allowed due to critical business operations
C. The time when Black Box testing is conducted
D. A tool used to block network traffic

23 What is the main advantage of an Internal penetration testing team?

A. They bring a completely unbiased external perspective
B. They do not require any rules of engagement
C. They have deep contextual knowledge of the organization's culture and systems
D. They are cheaper than automated tools

24 Which phase involves cleaning up artifacts, removing user accounts created during the test, and restoring settings?

A. Post-Exploitation / Restoration
B. Reconnaissance
C. Vulnerability Mapping
D. Pre-engagement

25 Which organization manages the Common Vulnerability Scoring System (CVSS)?

A. FBI
B. NSA
C. FIRST.org
D. Google

26 If a client requests a penetration test but forbids the use of automated scanners to prevent noise, this constraint is part of:

A. The invoice
B. The CVSS score
C. The Post-Mortem
D. The Rules of Engagement (RoE)

27 Which of the following is an example of Open Source Intelligence (OSINT)?

A. Scanning the target's firewall ports
B. Looking up employee email addresses on LinkedIn
C. Intercepting internal phone calls
D. Cracking the Wi-Fi password

28 What is the difference between Production and Staging environments in the context of scoping?

A. Staging is more secure than Production
B. Production is for developers; Staging is for customers
C. There is no difference
D. Production is live data; Staging is a replica for testing

29 Which legal concept requires the pentester to keep client findings secret?

A. Chain of Custody
B. Statement of Work (SOW)
C. Indemnification Clause
D. Non-Disclosure Agreement (NDA)

30 In the OWASP Top 10, what does OWASP stand for?

A. Organization for Web Authentication and Security Pentesters
B. Official Wireless Access Security Protocol
C. Online Wide Assessment of Security Procedures
D. Open Web Application Security Project

31 What is the primary goal of Physical Penetration Testing?

A. To test the firewall throughput
B. To check if the air conditioning is working
C. To ensure the website loads fast
D. To access the facility, server room, or workstations physically to compromise security

32 Which term describes a limitation where the tester cannot perform Denial of Service (DoS) attacks?

A. Scope Creep
B. Compliance Failure
C. Rules of Engagement Constraint
D. White Box Requirement

33 During the planning phase, defining Communication Paths ensures:

A. The client knows who to contact if the test causes a critical outage
B. The media is informed of the test
C. The tester can ask the client for passwords
D. The tester can blog about the findings

34 What is Scope Creep?

A. A method of physical entry
B. The gradual expansion of the project's goals or boundaries beyond the original agreement
C. The process of analyzing results
D. A type of slow network scan

35 Which testing methodology focuses heavily on the business logic and data flow?

A. Physical Testing
B. Wireless Testing
C. Application Logic Testing
D. Network Layer Testing

36 ISO/IEC 27001 is a standard for:

A. Medical Record Storage
B. Wireless Encryption
C. Payment Card Processing
D. Information Security Management Systems (ISMS)

37 In a Double-Blind test:

A. Both the tester and the client know everything
B. The tester knows nothing, and the client's security team is unaware of the test
C. The test is done twice
D. Two testers work simultaneously

38 What is the Statement of Work (SOW)?

A. A list of vulnerabilities found
B. A formal document defining the timeline, deliverables, and payment for the project
C. A manual for the testing software
D. A code snippet used for exploitation

39 If a pentester discovers evidence of a previous, ongoing criminal compromise during a test, what should they do?

A. Hack the criminal back
B. Include it in the final report next month
C. Stop the test immediately and notify the client's point of contact
D. Delete the evidence to clean the system

40 Which of the following is an example of Active Reconnaissance?

A. Browsing the company website
B. Port scanning using Nmap
C. Searching WHOIS records
D. Reading employee blogs

41 What does FEDRAMP standardize?

A. Security assessment and authorization for cloud products used by US federal agencies
B. European data privacy
C. Password complexity rules
D. Credit Card processing fees

42 Which scanning type identifies open ports and services?

A. Port Scanning
B. Social Engineering
C. Phishing
D. Vulnerability Scanning

43 In the context of the Cyber Kill Chain, which phase corresponds to the actual execution of malicious code on the target?

A. Actions on Objectives
B. Reconnaissance
C. Weaponization
D. Exploitation

44 Why is Shodan a relevant tool in the planning phase?

A. It generates reports
B. It cracks passwords
C. It is a virus scanner
D. It is a search engine for Internet-connected devices

45 What is Lateral Movement?

A. Moving physically from one office to another
B. Moving deeper into a network from a compromised host to access other resources
C. Escalating privileges on a single machine
D. Exfiltrating data out of the network

46 A Targeted Testing approach generally means:

A. Testing without any authorization
B. Random testing of all systems
C. The IT team and the pentester work together to test a specific system
D. Testing only on weekends

47 Which of the following represents a Technical constraint in scoping?

A. Legal restrictions
B. Bandwidth limitations or unstable network connections
C. Budget limitations
D. Holiday schedules

48 What is the primary focus of GDPR compliance testing?

A. Protecting US Government Data
B. Ensuring credit card transactions are fast
C. Protecting the privacy and personal data of EU citizens
D. Securing medical devices

49 When is the Chain of Custody relevant in penetration testing?

A. When writing the invoice
B. When handling physical evidence or forensic data found during a test
C. When scheduling the test
D. When ordering lunch

50 Mathematically, in the CVSS v3.1 equations, the Base Score is a function of:

A.
B.
C.
D.