1. ___________ process evaluates the adherence of an organization to its stated security policy.
A) Penetration Testing B) Vulnerability Assessment C) Risk Assessment D) Security Auditing
2. An NMAP command includes the host specification of 202.176.56-570. -*Β will scan _______ number of hosts.
A) 256 B) 2 C) Over 10,000 D) 512
3. Which of the following types of analysis is performed when an attacker has partial knowledge of inner workings of the application?
A) White Box B) Gray Box C) Black Box D) Announced
4. Select the following security policies that defines the use of VPN for gaining access to an internal corporate network.
A) Remote Access Policy B) Network Security Policy C) Access Control Policy D) Information Protection Policy
5. A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. What is the most efficient technique that the tester should consider using?
A) Tunneling over high port numbers B) Scanning using fragmented IP packets C) Tunneling scan over SSH D) Spoofing an IP address
1. Right Answer: D Explanation: Security auditing is the process, which evaluates the adherence of an organization to its stated security policy.
2. Right Answer: B Explanation: An Nmap command that includes the host specification of 202.176.56-570. -*Β will scan 512 number of hosts.
3. Right Answer: A Explanation: Grey-box is a type of analysis performed when an attacker has partial knowledge of inner workings of the application.
4. Right Answer: C Explanation: Remote Access Policy defines the use of VPN for gaining access to an internal corporate network.
5. Right Answer: A Explanation: A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Tunneling scan over SSH is the most efficient technique that the tester should consider using.
Leave a comment