Practice Exams 2 Flashcards
(125 cards)
An organization is currently accepting bids for a contract that will involve penetration testing and reporting. The organization is asking all bidders to provide proof of previous penetration testing and reporting experience. One contractor decides to print out a few reports from some previous penetration tests that they performed. What could have occurred as a result of this contractor’s actions?
A. The contractor will have their bid accepted with a special pay bonus because of their excellent work on previous penetration tests
B. The contractor may have inadvertently exposed numerous vulnerabilities they had found at other companies on previous assessments
C. The organization accepting the bids will want to use the reports as an example of the format for all bidders to use in the future
D. The company accepting the bids will hire the contractor because of the quality of the reports he submitted with his bid
B. The contractor may have inadvertently exposed numerous vulnerabilities they had found at other companies on previous assessments
Explanation
OBJ-1.1: Pentesters should never disclose any information from previous penetration tests to anyone outside of the assessed organization since this could expose the vulnerability found. This non-disclosure is usually outlined in the original contract and scope of work. If the contractor wishes to provide a sample report, then the report should be created specifically for the contract and only include information from a sample/test network, not a previous customer’s assessment. This could also be in breach of the NDA between the pentester and the organization, as well.
An internet marketing company decided that they didn’t want to follow the rules for GDPR because it would create too much work for them. They wanted to buy insurance, but no insurance company would write them a policy to cover any fines received. They considered how much the fines might be and decided to ignore the regulation and its requirements. Which of the following risk strategies did the company choose?
A. Transference
B. Mitigation
C. Acceptance
D. Avoidance
C. Acceptance
Explanation
OBJ-1.1: The internet marketing company initially tried to transfer the risk (buy insurance) but then decided to accept the risk. To avoid the risk, the company would have changed how it did business or would prevent European customers from signing up on their mailing list using geolocation blocks.
Dion Training wants to require students to logon using multifactor authentication in an effort to increase the security of the authorization and authentication process. Currently, students login to diontraining.com using a username and password. What proposed solution would best meet the goal of enabling multifactor authentication for the student login process?
A. Require students to enter a cognitive password requirement (such as ‘What is your dog’s name?’)
B. Require students to enter a unique six-digit number that is sent to them by SMS after entering their username and password
C. Require students to create a unique pin that is entered after their username and password are accepted
D. Require students to choose an image to serve as a secondary password after logon
B. Require students to enter a unique six-digit number that is sent to them by SMS after entering their username and password
Explanation
OBJ-1.1: All of the options presented are knowledge factors (something you know) except the six-digit number sent by SMS to your smartphone. This SMS sent number is an example of a possession factor or something you have. In this case, it verifies you have your smartphone. By combining this possession factor with the already in use knowledge factor (username and password), you can establish multifactor security for the login process.
What must be developed to show security improvements over time?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
C. Metrics
Explanation
OBJ-1.1: Metrics are a method of measuring something over time. If you wish to show the effect of security improvements over time, creating metrics would be a good option. For example, you may wish to look at the number of unpatched and known vulnerabilities. As this number decreases, your network would be considered to have improved security. Reports and testing tools alone cannot show progress. You must have measurable results using metrics.
Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?
A. PHI
B. PCI-DSS
C. GDPR
D. PII
B. PCI-DSS
Explanation
OBJ-1.1: The Payment Card Industry Data Security Standard (PCI DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment and store, process, and transmit cardholder data, you need to securely host your data and follow PCI compliance requirements.
A project lead reviews the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The work statement specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indicating weaknesses in the infrastructure. Based on this scope of work, what type of activity is to be performed?
A. Session hijacking
B. Vulnerability scanning
C. Social engineering
D. Penetration testing
D. Penetration testing
Explanation
OBJ-1.1: Penetration testing is the act of using a computer system, an individual network, or another application to find vulnerabilities that an attacker could use to compromise your systems. Penetration testing can also find endpoints with vulnerabilities, which makes the attack surface greater.
Dion Training has contracted you to conduct a penetration test of its web application hosted within AWS Lamba. Part of the assessment will include stress testing the web application using a simulated DDoS attack. Which of the following entities would be the proper signing authority for this penetration test?
A. Dion Training’s representative since they hired you
B. Amazon’s representative since they host the servers
C. Both organization’s representatives since one is your client and the other hosts the servers
D. Neither organization’s representatives since you are simulating a DDoS
C. Both organization’s representatives since one is your client and the other hosts the servers
Explanation
OBJ-1.1: Written authorization documents help control the amount of liability incurred by the penetration tester. You must ensure you have the correct authorization in place before beginning your engagement. You ALWAYS need written authorization from your client. If the client uses a third-party service provider, then you may need to also get proper authorization from them in writing too. During your engagement planning, you should contact the third-party service provider to determine if written consent is required. In the case of Amazon, there are a handful of services that do not require prior authorization before conducting a penetration test on behalf of your client. DoS and DDoS attacks and simulations do require written authorization from both your client and Amazon. If you do not have this, you could be held liable for any negative consequences to Amazon and its client’s servers or even be charged with criminal computer hacking.
Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access?
A. DLP
B. PII
C. AUP
D. GDPR
C. AUP
Explanation
OBJ-1.1: An acceptable use policy (AUP) governs employees’ use of company equipment and Internet services. Enforcing an acceptable use policy is important to protect the organization from the security and legal implications of employees (or customers) misusing its equipment. Typically, the policy will forbid the use of equipment to defraud, defame, or obtain illegal material. It is also likely to prohibit unauthorized hardware or software installation and to forbid actual or attempted intrusion (snooping) explicitly. An organization’s acceptable use policy may forbid the use of Internet tools outside of work-related duties or restrict such use to break times.
Which of the following is a DNS record type?
A. TTL
B. DHCP
C. PTR
D. LDAP
C. PTR
Explanation
OBJ-2.1: There are several types of DNS records, including A, AAAA, CNAME, PTR, SVR, and TXT. PTR records are used for the Reverse DNS (Domain Name System) lookup. Using the IP address, you can get the associated domain/hostname. An A record should exist for every PTR record.
Jason is conducting a penetration test against an organization’s Windows network. He then enters a command into the shell and receives the following output:
-=-=-=-=-=-
C:\Users\jason\Desktop> wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v “C:\Windows\” | findstr /i /v “””
Based on the output above, which of the following types of vulnerabilities does this Windows system contain?
A. Writeable services
B. Clear text credentials in LDAP
C. Unquoted service path
D. Unsecure file/folder permissions
C. Unquoted service path
Explanation
OBJ-2.3: This Windows machine contains an unquoted service path vulnerability, as shown in the output. If a service is created with an executable path that contains spaces and is not enclosed within quotes, then an unquoted service path vulnerability exists. In Windows, if the service is not enclosed within quotes and is having spaces, it would handle the space as a break and pass the rest of the service path as an argument. If the service involved has SYSTEM privileges, an attacker could exploit this vulnerability and gain SYSTEM level access. This command finds the service name, executable path, the display name of the service, and auto starts in all the directories except C:\Windows\ (since by default there is no such service that has spaces and is unquoted in this folder). As shown in the output, the service called “VulnerableService” has an unquoted service path.
Stephane was asked to assess the technical impact of a reconnaissance performed against his organization. He has discovered that a third party has been performing reconnaissance by querying the organization’s WHOIS data. Which category of technical impact should he classify this as?
A. Critical
B. High
C. Medium
D. Low
D. Low
Explanation
OBJ-2.1: This would be best classified as a low technical impact. Since WHOIS data about the organization’s domain name is publicly available, it is considered a low impact. This is further mitigated by the fact that your company gets to decide what information is actually published in the WHOIS data. Since only publicly available information is being queried and exposed, this can be considered a low impact.
Which of the following techniques listed below are not appropriate to use during a passive reconnaissance exercise against a specific target company?
A. WHOIS lookups
B. Banner grabbing
C. BGP looking glass usage
D. Registrar checks
B. Banner grabbing
Explanation
OBJ-2.1: Banner grabbing requires a connection to the host to grab the banner successfully. This is an active reconnaissance activity. All other options are considered passive processes and typically use information retrieved from third-parties that do not directly connect to an organization’s remote host.
What nmap switch would you use to determine which UDP ports are open on a targeted network?
A. -sN
B. -sP
C. -sS
D. -sU
D. -sU
Explanation
OBJ-2.2: In nmap, the -sU flag is used to scan UDP ports. The -sS flag will only scan TCP ports using an SYN scan. The -sP flag is a legacy (and depreciated) command for a ping scan. The -sN flag is used to conduct a TCP NULL scan.
You have been given access to a Windows system located on an Active Directory domain as part of a white box penetration test. Which of the following commands would provide information about other systems on this network?
A. net use
B. net user
C. net group
D. net config
A. net use
Explanation
OBJ-2.3: The net use command will list network shares that the workstation is using. This will help to identify file servers and print servers on the network. The net group command can only be used on domain controllers. The net config command will allow servers and workstations services to be controlled once they have already been identified. The net user command would show any user accounts on the local Windows workstation you are using.
You have conducted a Google search for the “site:diontraining.com -site:sales.diontraining.com financial.” What results do you expect to receive?
A. Google results matching all words in the query
B. Google results matching “financial” in domain webserver.com, but no results from the site sales.webserver.com
C. Google results for keyword matches from the site sales.diontraining.com that are in the domain diontraining.com but do not include the word financial
D. Google results for keyword matches on diontraining.com and sales.diontraining.com that include the word “financial”
B. Google results matching “financial” in domain webserver.com, but no results from the site sales.webserver.com
Explanation
OBJ-2.1: When conducting a Google search, using site:AAA in the query will return results only from that website (AAA). If you use –site:AAA, you will get results not explicitly on the website (AAA). In the case of this question, no results should show up from sales.diontraining.com. All results should only come from diontraining.com.
A technician just completed the second phase of their scans using Firewalk and the following output was displayed on their terminal:
-=-=-=-=- TCP port 21 – no response TCP port 22 – no response TCP port 23 – Time-to-live exceeded -=-=-=-=-
Based on these scan results, which of the following statements are true?
A. Firewall is blocking ports 21 through 23 and a service on the target is listening on port 23
B. No response from port 21 and 22 indicates services are not running on the target
C. Port 23 was not blocked at the firewall because the scan on port 23 passed through the filtering device
D. A TTL response error indicates port 23 was able to make a connection to the target
C. Port 23 was not blocked at the firewall because the scan on port 23 passed through the filtering device
Explanation
OBJ-2.2: Firewalk is a scanning tool that sends TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets and no response will be sent. Therefore, if a TTL exceeded message is received, this indicates that the associated port is being filtered by a firewall and not the gateway itself.
A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?
A. Analyze packet captures
B. Utilize netstat to locate active connections
C. Use nmap to query known ports
D. Review the ID3 logs on the network
A. Analyze packet captures
Explanation
OBJ-2.3: Captured packets show you the information that was traveling through certain files, etc. Packet sniffers detail the information they’ve received, so working through those shows if the external network shows or details software versions.
You conducted a security scan and found that port 389 is being used when connecting to LDAP for user authentication instead of port 636. The security scanning software recommends that you remediate this by changing user authentication to port to 636 wherever possible. What should you do?
A. Conduct remediation actions to update encryption keys on each server to match port 636
B. Mark this as a false positive in your audit report since the services that typically run on ports 389 and 636 are identical
C. Change all devices and servers that support it to port 636 since encrypted services run by default on port 636
D. Change all devices and servers that support it to port 636 since port 389 is a reserved port that requires root access and can expose the server to privilege escalation attacks
C. Change all devices and servers that support it to port 636 since encrypted services run by default on port 636
Explanation
OBJ-2.3: LDAP can be run on either port 389 or port 636. Port 389 is the standard port for LDAP but typically runs unencrypted LDAP services over this port. Instead, you should change all devices and servers that can technically support the change to port 636 since LDAP services over port 636 are encrypted by default.
Dion Training has publicly hosted web applications and an internal Intranet server that is protected by a firewall. Which of the following techniques would help them protect themselves against enumeration?
A. Reject all invalid emails received over SMTP
B. Allow full DNS zone transfer
C. Remove A records for any internal hosts
D. Enable null session pipeson their intranet
C. Remove A records for any internal hosts
Explanation
OBJ-2.3: Any internal server names and IPs should have their A records removed from the external DNS server because only internal users need to access the in ternal records. Dion Training’s internal servers should only have A records on their internal DNS server. Those A records should not be forwarded outside of the firewall boundary to prevent reconnaissance and enumeration by attackers.
A coworker is conducting open-source intelligence gathering for an upcoming penetration test against Dion Training. You look over their shoulder and saw them enter the following URL, https://www.google.com/search?q=*%40diontraining.com. Which of the following is true about the results of this search?
A. Returns no useful results for an attacker
B. Returns all web pages containing the text diontraining.com
C. Returns all web pages containing an email address affiliated with diontraining.com
D. Returns all web pages hosted at diontraining.com
C. Returns all web pages containing an email address affiliated with diontraining.com
Explanation
OBJ-2.1: Google interprets this statement as @diontraining.com and understands that the user is searching for email addresses since %40 is the hex code for the @ symbol. The * is a wild card character meaning that any text could be substituted for the * in the query. This type of search would provide an attacker with a list of email addresses associated with diontraining.com, which could be used as part of a spear-phishing campaign. To return all web pages hosted at diontraining.com, you should use the “site:” modifier in the query. To return all web pages with the text diontraining.com, enter “diontraining.com” into the Google search bar with no modifiers to return those results.
If you cannot ping a target because you are receiving no response or a response that states the destination is unreachable, then ICMP may be disabled on the remote end. If you wanted to elicit a response from a host using TCP, what tool would you use?
A. Hping
B. Traceroute
C. Ptunnel
D. Broadcast ping
A. Hping
Explanation
OBJ-2.2: Hping is a handy little utility that assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command but offered far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. Hping is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. Hping also allows you to map out firewall rule sets. It is also great for learning more about TCP/IP and experimenting with IP protocols. Hping does not support IPv6, though, so the NMAP creators have created Nping to fill this gap and serve as an updated variant of Hping. Traceroute and tracert are computer network diagnostic commands for displaying the route and measuring packets’ transit delays across an Internet Protocol network. Traceroute uses ICMP and not TCP. Broadcast ping is simply pinging the subnet’s broadcast IP using the ping command, but if a regular ping does not work, neither will a broadcast ping. Ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies. Ptunnel is used as a covert channel, not to elicit a response from a host using TCP.
A cybersecurity analyst is reviewing the logs of a proxy server and saw the following URL, https://www.google.com/search?q=password+filetype%3Axls+site%3Adiontraining.com&pws=0&filter=p. Which of the following is true about the results of this search? (SELECT THREE)
A. All search filters are deactivated
B. Returns only files hosted at diontraining.com
C. Returns only Microsoft Excel spreadsheets
D. Find sites related to diontraining.com
E. Excludes Microsoft Excel spreadsheets
F. Personalization is turned off
B. Returns only files hosted at diontraining.com
C. Returns only Microsoft Excel spreadsheets
F. Personalization is turned off
Explanation
OBJ-2.1: The above example searches for files with the name “password” in them (q=password) and (+) have a filetype equal to xls (filetype%3Axls, %3A is the hex-code for ‘:’) and (+) limits the results to files hosted on diontraining.com (site%3Adiontraining.com) and (&) disables personalization (pws=0) and (&) deactivates the directory filtering function (filter=p). If you wanted to exclude Microsoft Excel spreadsheets, this would be done by typing -filetype%3Axls as part of the search query. To find related websites or pages, you would include the “related:” term to the query. To deactivate all filters from the search, the “filter=0” should be used. To deactivate the directory filtering function, the “filter=p” is used.
A coworker sent you the following snippet of a Ruby script to use during an upcoming engagement for Dion Training’s corporate network:
-=-=-=-=-=-
if client.platform == ‘windows’
db_ok = client.framework.db.active
client.core.use(“priv”) if not client.respond_to?(“priv”)
client.core.use(“incognito”) if not client.respond_to?(“incognito”)
hashes = client.priv.sam_hashes addr = client.sock.peerhost
print_good “Working…” hashes.each do |hash| data = {} data[:host] = addr data[:port] = 445 data[:sname] = 'smb' data[:user] = hash.user_name data[:pass] = hash.lanman + ":" + hash.ntlm data[:type] = "smb_hash" data[:active] = true
print_line " Extracted: #{data[:user]}:#{data[:pass]}" client.framework.db.report_auth_info(data) if db_ok end -=-=-=-=-=-
During the upcoming engagement, what should you use this script to perform?
A. Network enumeration
B. Credential harvesting
C. Proxying a connection
D. Establishing a bind shell
B. Credential harvesting
Explanation
OBJ-2.3: This snippet of a Ruby script comes from the Metasploit framework as part of its credcollect.rb script. Most of the meterpreter scripts in Metasploit are written in Ruby, as it quickly became one of the favorite languages of penetration testers. Even if you cannot read and understand this entire script, you should identify some keywords and phrases to guess the correct answer. For example, line 6 mentions sam_hashes, which is used in Windows authentication. The script then extracts the data from the sam_hases for each username and password it could find and stores it in the client (Metasploit) database. For the exam, you need to read a script and understand its basic workflow and functions.
Which of the following tools can NOT be used to conduct a banner grab from a web server on a remote host?
A. netcat
B. telnet
C. wget
D. ftp
D. ftp
Explanation
OBJ-2.1: FTP cannot be used to conduct a banner grab. A cybersecurity analyst or penetration tester uses a banner grab to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network. This is commonly done using telnet, wget, or netcat.