PEN TEST
Quiz
•
Computers
•
12th Grade
•
Medium
CJ Wood
Used 6+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?
Passive footprinting
Backdoor testing
OS fingerprinting
Partially known environment
2.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Information that becomes unavailable, either permanently or temporarily, is known as...
Memory leak
Exfiltration
Data loss
Extortion
3.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?
A summary of all files with invalid group assignments
A list of all unpatched operating system files
The version of web server software in use
A list of local user accounts
4.
MULTIPLE CHOICE QUESTION
45 sec • 10 pts
A company has just purchased a new application server, and the security director wants to determine if the system is secure. The system is currently installed in a test environment and will not be available to users until the rollout to production next week. Which of the following would be the BEST way to determine if any part of the system can be exploited?
Tabletop exercise
Vulnerability scanner
Password cracker
Penetration test
5.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
A security analyst received an alert from their IPS regarding active exploit attempts from the Internet. Which of the following would provide the most detailed information about these exploit attempts?
Netstat
Wireshark
Nmap
OpenVAS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be a common result of a successful vulnerability scan?
A list of usernames and password hashes from a server
A list of Microsoft patches that have not been applied to a server
A copy of image files from a private file share
The BIOS configuration of a server
7.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
What cybersecurity technique is designed to detect the presence of threats that have not been discovered by normal security monitoring?
Threat hunting
CVE scanning
OSINT testing
Zero-day
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
