A. True B. False Question 19 of 41 2.0 Points A. Lexis-Nexis B. Dunn & Bradstree
ID: 3871681 • Letter: A
Question
A. True
B. False
Question 19 of 41
2.0 Points
A. Lexis-Nexis
B. Dunn & Bradstreet
C. Artemis
D. Whois
E. Either A or B
Question 20 of 41
2.0 Points
A. Data that can be gathered from public sources, which is very reliable.
B. Data that can be gathered from public sources, which may not be reliable.
C. Data that can be gathered from private sources, which is very reliable.
D. Data that can be gathered from private sources, which may not be reliable.
E. None of the above.
Question 21 of 41
2.0 Points
A. Services
B. User accounts
C. Ports
D. Shares
E. All of the above
Question 22 of 41
2.0 Points
A. Login to remote machines
B. Forward arbitrary TCP ports between any two machines
C. Upload and download files from a remote machine
D. Create quick proxy servers
E. All of the above
Question 23 of 41
2.0 Points
A. Passive data gathering
B. Active scanning of phone numbers
C. Actively mapping an organization’s vulnerabilities
D. Using vulnerability scanners to map an organization
E. None of the above
Question 24 of 41
2.0 Points
A. Corporate directory
B. Corporate website’s “about us” page
C. Financial information
D. All of the above
E. A & C only
Question 25 of 41
2.0 Points
A. Notify the company of the vulnerability, even though it's outside your scope.
B. Not notify the company of the vulnerability, because it's outside your scope.
C. Fix the vulnerability by downloading the patch and installing it.
D. Notify your colleagues so that they can have a laugh about the absurd security at the firm you're testing.
Threat modeling is a step of the Penetration Testing Execution Standard that is only done when performing a penetration test, not by an attacker.A. True
B. False
Reset SelectionQuestion 19 of 41
2.0 Points
If you were looking for historical financial information about a company, you want to check __________ database.A. Lexis-Nexis
B. Dunn & Bradstreet
C. Artemis
D. Whois
E. Either A or B
Reset SelectionQuestion 20 of 41
2.0 Points
When gathering information about a firm, which of the following best describes OSINT (Open Source Intelligence)?A. Data that can be gathered from public sources, which is very reliable.
B. Data that can be gathered from public sources, which may not be reliable.
C. Data that can be gathered from private sources, which is very reliable.
D. Data that can be gathered from private sources, which may not be reliable.
E. None of the above.
Reset SelectionQuestion 21 of 41
2.0 Points
What can enumeration of a computer system discover?A. Services
B. User accounts
C. Ports
D. Shares
E. All of the above
Reset SelectionQuestion 22 of 41
2.0 Points
SSH can be used to:A. Login to remote machines
B. Forward arbitrary TCP ports between any two machines
C. Upload and download files from a remote machine
D. Create quick proxy servers
E. All of the above
Reset SelectionQuestion 23 of 41
2.0 Points
What is the best description of footprinting?A. Passive data gathering
B. Active scanning of phone numbers
C. Actively mapping an organization’s vulnerabilities
D. Using vulnerability scanners to map an organization
E. None of the above
Reset SelectionQuestion 24 of 41
2.0 Points
Which of the following pieces of public information is likely to be useful in planning an attack?A. Corporate directory
B. Corporate website’s “about us” page
C. Financial information
D. All of the above
E. A & C only
Reset SelectionQuestion 25 of 41
2.0 Points
While testing a server for a firm, you find a severe vulnerability that you know can be easily fixed with a patch from the vendor. You have already gained the administrator access to the machine in question. The vulnerability is outside the scope of your original test. You should:A. Notify the company of the vulnerability, even though it's outside your scope.
B. Not notify the company of the vulnerability, because it's outside your scope.
C. Fix the vulnerability by downloading the patch and installing it.
D. Notify your colleagues so that they can have a laugh about the absurd security at the firm you're testing.
Explanation / Answer
FALSE
Threat modeling has two key traditional elements: assets and attacker. Each element is clearly identified and documented in every penetration test.
19) Answer: B
20 ) Answer : B
21) Answer : E
22) Answer : E
23) Answer : A
24) Answer : E
25 ) Answer : A
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.