Discount Offer
Go Back on 412-79 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

412-79 Practice Test


Page 5 out of 40 Pages

John, a penetration tester, was asked for a document that defines the project, specifies
goals, objectives, deadlines, the resources required, and the approach of the project.
Which of the following includes all of these requirements?


A.

Penetration testing project plan


B.

Penetration testing software project management plan


C.

Penetration testing project scope report


D.

Penetration testing schedule plan





A.
  

Penetration testing project plan



Rfere
http://books.google.com.pk/books?id=7dwEAAAAQBAJ&pg=SA4-PA14&lpg=SA4-
PA14&dq=penetration+testing+document+that+defines+the+project,+specifies+goals,+obje
ctives,+deadlines,+the+resources+required,+and+the+approach+of+the+project&source=b
l&ots=SQCLHNtthN&sig=kRcccmtDtCdZgB7hASShxSRbfOM&hl=en&sa=X&ei=hyMfVOKz
GYvmarvFgaAL&ved=0CB0Q6AEwAA#v=onepage&q=penetration-testing-docume
nt-that-defines-the-project%2C-specifies-goals%2C-objectives%
2C-deadlines%2C-the-resources-required%2C-and-the-approac
h-of-the-project&f=false

Before performing the penetration testing, there will be a pre-contract discussion with
different pen-testers (the team of penetration testers) to gather a quotation to perform pen
testing.

Which of the following factors is NOT considered while preparing a price quote to perform
pen testing?


A.

Total number of employees in the client organization


B.

Type of testers involved


C.

The budget required


D.

Expected time required to finish the project





A.
  

Total number of employees in the client organization



Identify the injection attack represented in the diagram below:



A.

XPath Injection Attack


B.

 XML Request Attack


C.

XML Injection Attack


D.

Frame Injection Attack





C.
  

XML Injection Attack



Reference:http://projects.webappsec.org/w/page/13247004/XML-Injection

Which of the following password hashing algorithms is used in the NTLMv2 authentication
mechanism?


A.

AES


B.

DES (ECB mode)


C.

MD5


D.

RC5





C.
  

MD5



Why is a legal agreement important to have before launching a penetration test?



A.

Guarantees your consultant fees


B.

Allows you to perform a penetration test without the knowledge and consent of the
organization's upper management


C.

 It establishes the legality of the penetration test by documenting the scope of the project
and the consent of the company.


D.

It is important to ensure that the target organization has implemented mandatory
security policies





C.
  

 It establishes the legality of the penetration test by documenting the scope of the project
and the consent of the company.




Page 5 out of 40 Pages
Previous