1.8 Flashcards

Explain the techniques used in penetration testing.

1
Q

Is a cybersecurity assessment methodology used to identify and exploit security vulnerabilities in a system, network, or application.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to an environment for which comprehensive information and documentation are available, including system configurations, network architecture, and security controls. Penetration testing in a _____________ involves testing against well-understood systems and known vulnerabilities.

A

Known environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to an environment for which limited or incomplete information is available. Penetration testing in an ________________ involves exploring and discovering vulnerabilities through reconnaissance, scanning, and enumeration techniques.

A

Unknown environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to an environment for which some information is available, but critical details or configurations are missing or incomplete. Penetration testing in a _________________ involves leveraging available information while conducting additional reconnaissance and analysis to uncover hidden vulnerabilities.

A

Partially known environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________________ in cybersecurity define the scope, objectives, limitations, and rules governing a cybersecurity assessment, exercise, or operation, such as penetration testing. __________ outline the permissible actions, targets, and methodologies that participants are allowed to use and establish guidelines to ensure the safety, legality, and effectiveness of the activity.

A

Rules of engagement (ROE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to the techniques used by attackers to move horizontally across a network after gaining initial access to a system. Allows attackers to escalate privileges, explore the network, and compromise additional systems to achieve their objectives.

A

Lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is the process of gaining higher levels of access than originally granted by exploiting vulnerabilities in a system.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is the ability of an attacker to exist beyond a machine reboot or after disconnection.

A

Persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are mechanisms where companies pay hackers for revealing the details of vulnerabilities that they discover.

A

Bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where an attacker moves to a new location in a network and begins the attack process over again.

A

Pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Involves gathering information about a target system, network, or environment without directly interacting with it.

A

Passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Involves actively probing, scanning, or interacting with target systems to gather information, such as port scanning, network mapping, or service enumeration.

A

Active reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The act of using a drone to fly over a facility and capture wireless network traffic.

A

War flying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Involves driving or walking around urban or suburban areas to detect and map wireless networks and access points.

A

War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the process of gathering information about a target system, network, or organization to identify potential attack vectors, vulnerabilities, or points of entry.

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to the analysis of publicly available information from open sources to gather intelligence about a system.

A

OSINT

17
Q

A team of cybersecurity professionals who are focused on offense.

A

Red-team

18
Q

A team of cybersecurity professionals who are focused on defense.

A

Blue-team

19
Q

Is a neutral group of cybersecurity professionals responsible for overseeing cybersecurity exercises, simulations, or competitions.

A

White-team

20
Q

A team of cybersecurity professionals that combine the red and blue team.

A

Purple-team