Domain 6 Flashcards

1
Q

An ICMP echo request is commonly used during the enumeration or host discovery phase of the serve side attack methodology. What is this technology?

A

Ping sweep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between pen testing and vulnerability testing

A

Pen testing includes exploiting flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is effective against server side attacks

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

I. A client side exploitation attack after reviewing the logs, what initiated the attack?

A

Victims machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Placing a sniffer at a networks choke point and trying to discover applications and servers in use on a network are examples of what

A

Passive fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a key tool in web application pen testing that assists dynamic application security testing

A

HTTP interception proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the prices of network enumeration

A

Host discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most appropriate technique for determining IPv6 enabling hosts during
Host discovery phase

A

Neighbor discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker compromised a system by first initiating TVP three way handshake to Tcp port 445 and then launching and exploit

A

Service side attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a pen tester were to exploit oracle, Java, adobe flash or Microsoft office, what type of exploit would this be

A

Client side exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the most important consideration for back ups

A

Ability to restore the backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What phase of the server side exploitation methodology would include reviewing LinkedIn or Twitter

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of testing targets unexpected user behavior

A

Misuse case testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What method includes building scripts or tools that simulate activities normally performed in an application

A

Synthetic transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tool would send the following series of a characters to an application AAA,AAAA,AAAAAAAAAA

A

Fuzzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a pen testers is performing host enumeration from the same layer 2 network what is the most efficient way to discover hosts on the network

A

ARP

17
Q

An attacker successfully launched a SYN flood attack against your org primary public server. What has been impacted

A

Availability