PEN TEST

PEN TEST

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

 9.2.1 Explain the proper use of penetration testing versus vuln

9.2.1 Explain the proper use of penetration testing versus vuln

Sec+ review

Sec+ review

ECHA Test Review 1

ECHA Test Review 1

Sec+ review

Sec+ review

SEC+ Practice Questions C-48-C68

SEC+ Practice Questions C-48-C68

PEN TEST

PEN TEST

Assessment

Quiz

Computers

12th Grade

Medium

Created by

CJ Wood

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?

Passive footprinting

Backdoor testing

OS fingerprinting

Partially known environment

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Information that becomes unavailable, either permanently or temporarily, is known as...

Memory leak

Exfiltration

Data loss

Extortion

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?

A summary of all files with invalid group assignments

A list of all unpatched operating system files

The version of web server software in use

A list of local user accounts

4.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

A company has just purchased a new application server, and the security director wants to determine if the system is secure. The system is currently installed in a test environment and will not be available to users until the rollout to production next week. Which of the following would be the BEST way to determine if any part of the system can be exploited?

Tabletop exercise

Vulnerability scanner

Password cracker

Penetration test

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

A security analyst received an alert from their IPS regarding active exploit attempts from the Internet. Which of the following would provide the most detailed information about these exploit attempts?

Netstat

Wireshark

Nmap

OpenVAS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be a common result of a successful vulnerability scan?

A list of usernames and password hashes from a server

A list of Microsoft patches that have not been applied to a server

A copy of image files from a private file share

The BIOS configuration of a server

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What cybersecurity technique is designed to detect the presence of threats that have not been discovered by normal security monitoring?

Threat hunting

CVE scanning

OSINT testing

Zero-day

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?