Information gathering is performed to:
i) Collect basic information about the target company and its network
ii) Determine the operating system used, platforms running, web server versions, etc.
iii) Find vulnerabilities and exploits
Which of the following pen testing tests yields information about a company’s technology
infrastructure?
A.
Searching for web page posting patterns
B.
Analyzing the link popularity of the company’s website
C.
Searching for trade association directories
D.
Searching for a company’s job postings
Searching for a company’s job postings
The Internet is a giant database where people store some of their most private information
on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS
attacks, website defacement, lost computers, accidental publishing, and more have all
been sources of major leaks over the last 15 years
What is the biggest source of data leaks in organizations today?
A.
Weak passwords and lack of identity management
B.
Insufficient IT security budget
C.
Rogue employees and insider attacks
D.
Vulnerabilities, risks, and threats facing Web sites
Rogue employees and insider attacks
A firewall’s decision to forward or reject traffic in network filtering is dependent upon which
of the following?
A.
Destination address
B.
Port numbers
C.
Source address
D.
Protocol used
Protocol used
Reference:http://www.vicomsoft.com/learning-center/firewalls/(what does afirewall do)
John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing
pricing report for a client.
Which of the following factors does he need to consider while preparing the pen
testingpricing report?
A.
Number of employees in the client organization
B.
Complete structure of the organization
C.
Number of client computers to be tested and resources required to perform a pen test
D.
Number of servers available in the client organization
Number of client computers to be tested and resources required to perform a pen test
Which of the following is a framework of open standards developed by the Internet
Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?
A.
DNSSEC
B.
Netsec
C.
IKE
D.
IPsec
IPsec
Reference:http://www.cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-
0/ip_security/provisioning/guide/IPsecPG1.html
Page 7 out of 40 Pages |
Previous |