pen testing Flashcards

(17 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is penetration testing?

A

A simulated real-world cyberattack to assess how deeply an attacker could access a system under different knowledge scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ethical hacking?

A

A professional practice where trained individuals identify and fix vulnerabilities before malicious actors can exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a red team exercise?

A

An advanced simulation that mimics real adversary behavior to test organizational defenses, especially the blue team’s incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does JHD distinguish pentests from red team exercises?

A

Pentests aim to generate a report and evidence; red team exercises are operational drills testing the organization’s real-time responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four types of penetration tests under PCI DSS?

A
  1. Network 2. Web application 3. Wireless 4. Social engineering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the seven phases of a typical pentest?

A
  1. Pre-engagement 2. Intelligence Gathering 3. Threat Modeling 4. Vulnerability Analysis 5. Exploitation 6. Post-Exploitation 7. Reporting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between vulnerability scanning and pentesting?

A

Vulnerability scanning is automated and broad; pentesting is manual, deeper, and simulates a real attacker’s behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an internal vulnerability scan?

A

A scan performed inside the organization every 3 months to detect and resolve high or critical vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an external vulnerability scan?

A

Conducted by an Approved Scanning Vendor (ASV) from outside the organization at least quarterly to detect exposed issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is required in a penetration testing methodology?

A

It must be documented and cover application and network layers, segmentation, threat history, and retention of findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kinds of attacks must software be tested against?

A

Injection (e.g., SQL), cryptographic flaws, access control bypass, buffer/data attacks, business logic flaws, and all high-risk vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Software Bill of Materials (SBoM)?

A

An inventory of components (custom, third-party) used in software, aiding vulnerability and patch management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are ‘firewall’ requirements under PCI DSS?

A

Web-facing apps must have an automated system that detects and blocks or alerts on attacks, with active logging and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a limitation of Web Application Firewalls (WAFs)?

A

Many WAFs are bypassed or run in alert-only mode, reducing effectiveness despite high costs and expectations for protection or compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tools are commonly used in pentesting?

A

Tools include both commercial and open source suites like Kali Linux, which bundles over 600 tools for varied testing needs.

17
Q

What’s a key insight from real-world pentesting stories?

A

Success often involves guesswork, intuition, and exploiting poor design (e.g., overly privileged interfaces), showing the need for human creativity.