
PEN TEST
Authored by CJ Wood
Computers
12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?
Passive footprinting
Backdoor testing
OS fingerprinting
Partially known environment
2.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Information that becomes unavailable, either permanently or temporarily, is known as...
Memory leak
Exfiltration
Data loss
Extortion
3.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?
A summary of all files with invalid group assignments
A list of all unpatched operating system files
The version of web server software in use
A list of local user accounts
4.
MULTIPLE CHOICE QUESTION
45 sec • 10 pts
A company has just purchased a new application server, and the security director wants to determine if the system is secure. The system is currently installed in a test environment and will not be available to users until the rollout to production next week. Which of the following would be the BEST way to determine if any part of the system can be exploited?
Tabletop exercise
Vulnerability scanner
Password cracker
Penetration test
5.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
A security analyst received an alert from their IPS regarding active exploit attempts from the Internet. Which of the following would provide the most detailed information about these exploit attempts?
Netstat
Wireshark
Nmap
OpenVAS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be a common result of a successful vulnerability scan?
A list of usernames and password hashes from a server
A list of Microsoft patches that have not been applied to a server
A copy of image files from a private file share
The BIOS configuration of a server
7.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
What cybersecurity technique is designed to detect the presence of threats that have not been discovered by normal security monitoring?
Threat hunting
CVE scanning
OSINT testing
Zero-day
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Instalacion de Equipos #1
Quiz
•
9th Grade - University
15 questions
Evaluation # 1 - 7th Grade
Quiz
•
1st - 12th Grade
11 questions
UF465 - Tema 5
Quiz
•
12th Grade
12 questions
ICT Computer Basics pt1
Quiz
•
10th - 12th Grade
10 questions
ICT as Social Change
Quiz
•
12th Grade
15 questions
QUIZZ ACCURATE V5 KELAS XI AKL
Quiz
•
9th - 12th Grade
10 questions
HTML & Google Site Seatwork
Quiz
•
12th Grade
15 questions
1.1 Computer Systems Essential Knowledge
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade