Unit6 - Subjective Questions

INT245 • Practice Questions with Detailed Answers

1

Explain the significance of establishing a Communication Path and an Escalation Matrix prior to a penetration test.

2

What are Communication Triggers in the context of penetration testing? List four common scenarios that trigger immediate communication.

3

Compare Dradis and MagicTree as reporting and collaboration tools used during penetration testing.

4

Why is identifying the Report Audience crucial before drafting a penetration testing report? Differentiate between the needs of the C-Suite and the Technical Team.

5

Describe the essential components of a Penetration Testing Report. What should be included in the 'Methodology' section?

6

Draft a brief outline for an Executive Summary. Why is this often considered the most important part of the report?

7

Discuss the Best Practices for the Presentation of Findings in a report to ensure clarity and reproducibility.

8

Explain the concept of Risk Classification using the CVSS framework. How does it help in prioritizing remediation?

9

When Recommending Remediation, why is it important to provide both 'Immediate Workarounds' and 'Long-term Solutions'? Give an example.

10

Describe the Post-Report Delivery Activities. What actions constitute the 'Clean-up' phase?

11

Define IoT (Internet of Things) in the context of security. What makes the Attack Surface of IoT devices unique compared to traditional servers?

12

List and explain three common vulnerabilities found in the OWASP IoT Top 10.

13

Describe the role of Firmware Analysis in IoT Penetration Testing. What tools are commonly used?

14

How is Shodan utilized in the reconnaissance phase of an attack on IoT devices?

15

Explain the security risks associated with IoT Communication Protocols such as Zigbee and Bluetooth Low Energy (BLE).

16

What measures should be taken to ensure the Security of the Report itself during delivery?

17

Differentiate between Verification and Validation in the context of reporting findings.

18

Explain the structure and necessity of a Remediation Plan in a penetration test report.

19

Analyze the importance of Report Retention Policies in the post-engagement phase. Why must data be destroyed after a certain period?

20

Discuss the complete Lifecycle of the Reporting Phase, from data collection to final sign-off.