1.
Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?
2.
Information gathering is performed to: i) Collect basic information about the target company and its network ii) Determine the operating system used, platforms running, web server versions, etc. iii) Find vulnerabilities and exploits Which of the following pen testing tests yields information about a company's technology infrastructure?
3.
A penetration tester performs OS fingerprinting on the target server to identify the operating system used on the target server with the help of ICMP packets. While performing ICMP scanning using Nmap tool, message received/type displays "3
4.
Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?
5.
Traffic on which port is unusual for both the TCP and UDP ports?
6.
Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?
7.
What sort of vulnerability assessment approach starts by building an inventory of protocols found on the machine?
8.
During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?
9.
Identify the correct formula for Return on Investment (ROI).
10.
Identify the type of firewall represented in the diagram below: