Cram Flashcards

1
Q

What standard was developed by business professionals as a best practice guide/methodology for conducting penetration testing?

A

Penetration Testing Execution Standard (PTES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What organization aimed at increasing awareness and provides a framework for testing during each phase of the software development process?

A

Open Web Application Security Project (OWASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What guide provides different steps for the testing process and outlines the importance of assessing the entire organization, including the people, processes, and technology, during a penetration test?

A

OWASP Testing Guide (OTG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What manuel was developed by the Institute for Security and Open Methodologies (ISECOM) and outlines every area of an organization that needs testing and how to conduct the relevant tests?

A

The Open Source Security Testing Methodology Manual (OSSTMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What framework is considered a open-source resource available to cybersecurity professionals and comprised of documents that relate to penetration testing, such as guidelines on business continuity and disaster recovery along with legal and regulatory compliance?

A

The Information Systems Security Assessment Framework (ISSAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What framework provides tools and techniques displayed as columns in a matrix that describe different tasks conducted by an attacker or penetration tester during an engagement?

A

The “MITRE ATT&CK” (Adversarial Tactics, Techniques & Common Knowledge) framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What contract agreement is reached between two or more parties where each party agrees to most terms that will govern all other future transactions and agreements?

A

Master Services Agreement (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What agreement covers conditions such as: Payment terms, Product warranties, Intellectual property ownership, Dispute resolution, Allocation of risk, and Indemnification, corporate social responsibility, business ethics, network facility access?

A

Master Services Agreement (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What formal document, employed in the field of project management and provisional found in the MSA, explains the problem to be solved, work activities, project deliverables, and timeline for work completion?

A

Statement of Work (SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What document addresses - Purpose, Scope of work, Location of work, Period of performance, Deliverables schedule, Applicable industry standards, Acceptance criteria, Special requirements, Payment schedule?

A

Statement of Work (SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What document puts into writing guidelines and constrains regarding the execution of a pentest (what is and is not authorized)?

A

Rules of Engagement (RoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What document elaborates on these subjects: scope, location, applicable industry standards, and timelines?

A

Rules of Engagement (RoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a XML injection do?

A

Manipulate or compromise the logic of an XML application or service. The injection of unintended XML content and/or structures into an XML message can alter an application’s intended logic. XML Injection can cause the insertion of malicious content into resulting messages/documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between Password spraying & Credential stuffing?

A

Credential stuffing is the automated injection of breached username/password pairs VS. Password spraying refers to the attack method that takes many usernames and loops them with a single password or multiple iterations using many different passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What attack uses specially crafted URL that includes attack code that will cause information that users enter into their web browser to be sent to the attacker?

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CSRF?

A

Cross-Site Request Forgery -a client-side injection attack that causes a user to perform an action they do no intend against a trusted website.

17
Q

What is a Dictionary Attack?

A

A technique for defeating a cipher or authentication mechanism by trying hundreds or millions of likely possibilities, such as words in a dictionary.

18
Q

What is the difference between Bluejacking & Bluesnarfing?

A

Bluejacking sends unsolicited messages over Bluetooth VS. Bluesnarfing involves taking data from a smartphone or tablet over Bluetooth without permission.

19
Q

What system is designed to protect network devices based on ports, protocols, and signatures?

A

Intrusion Prevention System (IPS)

20
Q

De-confliction is the process of…. ?

A

Distinguishing a pentest from an actual compromise or other activity to help resolve contradictory conclusions or responses.

21
Q

What is De-escalation?

A

A process for addressing potential issues as quickly as possible in order to minimize or mitigate impact.

22
Q

What does fraggle, teardrop, and Smurf attack have in common?

A

They are all a form of DoS

-A fraggle attack is a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router’s broadcast address.
-A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented TCP packets to a target machine.
-The Smurf attack is a distributed denial-of-service attack (DDoS). Large numbers of ICMP packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.

23
Q

What type of technique is MAC flooding?

A

A technique employed to compromise the security of switched network devices. It forces legitimate MAC addresses out of the CAM table in the switch and forces a unicast flooding behavior, potentially sending sensitive information to portions of the network where it is not normally intended to go.

24
Q

What is a karma attack?

A

A variant of the evil twin attack that exploits the behavior of a wireless client trying to connect to its preferred network list.

25
Q

What is a pass the hash attack?

A

A network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network

26
Q

What is the difference between a stateless packet inspection vs. stateful packet inspection firewall ?

A

A stateless packet inspection firewall allows or denies packets based on source and destination IP address or the traffic type (TCP, UDP, ICMP, etc.) VS. A stateful packet inspection firewall determines which network packets should be allowed through the firewall by utilizing the information it gathered regarding active connections as well as the existing ACL rules.

27
Q

What is a “TTL exceeded message” a good indication of?

A

The port is being filtered by a firewall and not the gateway itself.

28
Q

What is JAD?

A

Java Application Decompiler

29
Q

What is ProxyChains and what must it be combined with?

A

A tool that allows a penetration tester to pivot to a new subnet, combined with the modification of the penetration tester’s routing tables.

30
Q

False positive

A

Think false problem - situation where a test case fails, but in actuality there is no bug and functionality is working correctly

31
Q

False negative

A

false senses of security - by indicating you don’t have a vulnerability when in fact you do. T=-

32
Q

True positive

A

A true positive is an outcome where the model correctly predicts the positive class. you said it was and it was

33
Q

True negative

A

you said it wasn’t and it wasn’t