Penetration Testing Mid Term

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:37 PM on 2/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

The goal of a(n) ______________ is to create a ranked list of weaknesses in a computer system along with potential remediation steps.

Vulnerability Assessment

2
New cards

What type of Vulnerability Assessment is performed with internal knowledge of the systems, such as source code of applications or naming conventions of networked systems?

White Box

3
New cards

It is legal for an Ethical Hacker to try and find and exploit vulnerabilities in a system without permission, as long as they provide the target with their findings afterwards.

False

4
New cards

Which of the 7 stages of penetration testing does OSINT fall under?

Information Gathering

5
New cards

Which of the 7 stages of penetration testing does port scanning fall under?

Information Gathering

6
New cards

Which of the following is the primary difference between a whitehat hacker and a blackhat hacker?

Consent from all participating parties/Legality

7
New cards

Which of the following is NOT a source that can be used during Open Source Intelligence Gathering?

Database of employee records on the targets network

8
New cards

Which of the following tools can be used to gather information about DNS for an organization or system. (Select all that apply)

zone transfers

nslookup

whois

9
New cards

Performing a network scan is considered a passive for of OSINT recon?

False

10
New cards

A Google _______ query is a search string that uses advanced search operators to find information that is not readily available on a website.

dork

11
New cards

Which of the follow tools can be used for port scanning?

nmap

netcat

Metasploit Framework

12
New cards

The OS that is running on a system can be determined through a port scan.

True

13
New cards

Which type of scan uses the complete TCP handshake when scanning for ports?

Connect Scan

14
New cards

Which type of port scan can be used to determine if a firewall is statefull or stateless?

ACK Scan

15
New cards

When running a SYN port scan using nmap, what state indicates there is a firewall in place?

Filtered

16
New cards

Running a port scan on a network to determine what services and versions are running based on network responses is known as _____________.

fingerprinting

17
New cards

Kali Linux is the only thing you need to perform a penetration test.

False

18
New cards

Kali Linux is based of which popular distribution of Linux?

Debian

19
New cards

The Metasploit Framework can only be used to exploit vulnerabilities.

False

20
New cards

A _____________ is a flaw or weakness in an asset that can leave it open to attack.

vulnerability

21
New cards

Something (or someone) within an organization that can be the target of an attack and may have vulnerabilities is known as an _________.

asset

22
New cards

Match the following assets with the potential vulnerabilities.

Data - No Encryption (Plain Text)

Hardware - Active USB Ports

Computer System - Outdated OS

Application - Bad Code

Network - Open Ports

Personnel - Password

Physical Objects - Unlocked Doors

23
New cards

The more complex a system is, the more likely it will have vulnerabilities.

True

24
New cards

A vulnerability assessment includes exploiting the results.

False

25
New cards

Low, Moderate, Critical, and Catastrophic are the only category levels vulnerabilities are ranked by.

False

26
New cards

Match each tool with the type of vulnerability assessment they would be used for.

Each type of assessment may have more than one tool.

nmap - Manual

netcat - Manual

nmap scripting engine (NSE) - semi manual

Metasploit scanner modules - semi manual

Nessus - Automatic

OpenVAS - Automatic

Nexpose - Automatic

27
New cards

A reference method for publicly known vulnerabilities is known as ____________?

Common Vulnerabilities and Exposures

28
New cards

The code or script that is designed to exploit a vulnerability is known as ___________?

Payload

29
New cards

The ___________ Framework contains pre-written exploits, but also has the tools to help a Penetration tester write there own.

metasploit

30
New cards

Logging into a system with default credentials that have not been changed in order to gain access is a simple example of a(n) ___________.

exploit

31
New cards

A default username and password not being changed on a system is a simple example of a(n)___________.

vulnerability

32
New cards

Which of the following are examples of unsecured services that can have data sniffed in plain text.

FTP

SMTP

SSH

33
New cards

Capturing encrypted data is of no use to a penetration tested because it cannot be read.

False

34
New cards

Passive sniffing is an effective method of packet capture on a switched network.

False

35
New cards

The active sniffing technique known as MAC flooding is only effective when the target switch is configured to fail-_____.

open

36
New cards

ARP poisoning is a type of Man-in-the-Middle attack where you spoof the IP address of your target.

False

37
New cards

For an ARP poisoning attack to be effective, what must you do to the packets after you capture them?

Forward the packet to the original destination

38
New cards

The main goal of a Denial of Service attack is to make the target system become unstable or unavailable.

True

39
New cards

A DDoS attack is carried out by many systems connected to what is commonly known as a(n) ___________

botnet

40
New cards

Botnets can be used for other purposes besides a DDoS attack.

True

41
New cards

A DNS poisoning attack requires the attacker to install malware on the DNS server.

False

Explore top notes

note
Chapter 21: Contractual Harm
Updated 1279d ago
0.0(0)
note
Notes on Solubility and Ksp
Updated 341d ago
0.0(0)
note
PERDEV "Powers of Mind"
Updated 1266d ago
0.0(0)
note
chapter 3 notes
Updated 1245d ago
0.0(0)
note
leerdoelen
Updated 64d ago
0.0(0)
note
Chapter 28: Forensic Psychiatry
Updated 1080d ago
0.0(0)
note
Chapter 21: Contractual Harm
Updated 1279d ago
0.0(0)
note
Notes on Solubility and Ksp
Updated 341d ago
0.0(0)
note
PERDEV "Powers of Mind"
Updated 1266d ago
0.0(0)
note
chapter 3 notes
Updated 1245d ago
0.0(0)
note
leerdoelen
Updated 64d ago
0.0(0)
note
Chapter 28: Forensic Psychiatry
Updated 1080d ago
0.0(0)

Explore top flashcards

flashcards
FINAL ABBREVIATIONS
80
Updated 476d ago
0.0(0)
flashcards
YR 9 Physics
38
Updated 213d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 31d ago
0.0(0)
flashcards
Glycolysis and Redox Rxns Quiz
38
Updated 1155d ago
0.0(0)
flashcards
Spanish II HA 12-2 Vocab
59
Updated 62d ago
0.0(0)
flashcards
Biosci 221 - Fungi
21
Updated 1118d ago
0.0(0)
flashcards
FINAL ABBREVIATIONS
80
Updated 476d ago
0.0(0)
flashcards
YR 9 Physics
38
Updated 213d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 31d ago
0.0(0)
flashcards
Glycolysis and Redox Rxns Quiz
38
Updated 1155d ago
0.0(0)
flashcards
Spanish II HA 12-2 Vocab
59
Updated 62d ago
0.0(0)
flashcards
Biosci 221 - Fungi
21
Updated 1118d ago
0.0(0)