Pregunta 1
Pregunta
During a penetration test, Lauren is asked to test the organization’s
Bluetooth security. Which of the following is not a concern she should
explain to her employers?
Respuesta
-
A. Bluetooth scanning can be time-consuming.
-
B. Many devices that may be scanned are likely to be personal
devices.
-
C. Bluetooth passive scans may require multiple visits at different
times to identify all targets.
-
D. Bluetooth active scans can’t evaluate the security mode of
Bluetooth devices.
Pregunta 2
Pregunta
What term describes software testing that is intended to uncover new
bugs introduced by patches or configuration changes?
Respuesta
-
A. Nonregression testing
-
B. Evolution testing
-
C. Smoke testing
-
D. Regression testing
Pregunta 3
Pregunta
Which of the tools cannot identify a target’s operating system for a
penetration tester?
Respuesta
-
A. Nmap
-
B. Nessus
-
C. Nikto
-
D. sqlmap
Pregunta 4
Pregunta
Susan needs to predict high-risk areas for her organization and wants
to use metrics to assess risk trends as they occur. What should she do
to handle this?
Respuesta
-
A. Perform yearly risk assessments.
-
B. Hire a penetration testing company to regularly test organizational
security.
-
C. Identify and track key risk indicators.
-
D. Monitor logs and events using a SIEM device.
Pregunta 5
Pregunta
What major difference separates synthetic and passive monitoring?
Respuesta
-
A. Synthetic monitoring only works after problems have occurred.
-
B. Passive monitoring cannot detect functionality issues.
-
C. Passive monitoring only works after problems have occurred.
-
D. Synthetic monitoring cannot detect functionality issues.
Pregunta 6
Pregunta
Chris uses the standard penetration testing methodology shown here.
Use this methodology and your knowledge of penetration testing to
answer questions about tool usage during a penetration test.
What task is the most important during Phase 1, Planning?
Respuesta
-
A. Building a test lab
-
B. Getting authorization
-
C. Gathering appropriate tools
-
D. Determining if the test is white, black, or gray box
Pregunta 7
Pregunta
Chris uses the standard penetration testing methodology shown here.
Use this methodology and your knowledge of penetration testing to
answer questions about tool usage during a penetration test.
Which of the following tools is most likely to be used during
discovery?
Respuesta
-
A. Nessus
-
B. john
-
C. Nmap
-
D. Nikto
Pregunta 8
Pregunta
Chris uses the standard penetration testing methodology shown here.
Use this methodology and your knowledge of penetration testing to
answer questions about tool usage during a penetration test.
Which of these concerns is the most important to address during
planning to ensure that the reporting phase does not cause problems?
Respuesta
-
A. Which CVE format to use
-
B. How the vulnerability data will be stored and sent
-
C. Which targets are off-limits
-
D. How long the report should be
Pregunta 9
Pregunta
What four types of coverage criteria are commonly used when
validating the work of a code testing suite?
Respuesta
-
A. Input, statement, branch, and condition coverage
-
B. Function, statement, branch, and condition coverage
-
C. API, branch, bounds, and condition coverage
-
D. Bounds, branch, loop, and condition coverage
Pregunta 10
Pregunta
As part of his role as a security manager, Jacob provides the following
chart to his organization’s management team. What type of
measurement is he providing for them?
Respuesta
-
A. A coverage rate measure
-
B. A key performance indicator
-
C. A time to live metric
-
D. A business criticality indicator
Pregunta 11
Pregunta
What does using unique user IDs for all users provide when reviewing
logs?
Respuesta
-
A. Confidentiality
-
B. Integrity
-
C. Availability
-
D. Accountability
Pregunta 12
Pregunta
Which of the following is not an interface that is typically tested
during the software testing process?
Respuesta
-
A. APIs
-
B. Network interfaces
-
C. UIs
-
D. Physical interfaces
Pregunta 13
Pregunta
Alan’s organization uses the Security Content Automation Protocol
(SCAP) to standardize its vulnerability management program. Which
component of SCAP can Alan use to reconcile the identity of
vulnerabilities generated by different security assessment tools?
Respuesta
-
A. OVAL
-
B. XCCDF
-
C. CVE
-
D. SCE
Pregunta 14
Pregunta
Misconfiguration, logical and functional flaws, and poor programming
practices are all causes of what common security issue?
Pregunta 15
Pregunta
Which of the following strategies is not a reasonable approach for
remediating a vulnerability identified by a vulnerability scanner?
Pregunta 16
Pregunta
During a penetration test Saria calls her target’s help desk claiming to
be the senior assistant to an officer of the company. She requests that
the help desk reset the officer’s password because of an issue with his
laptop while traveling and persuades them to do so. What type of
attack has she successfully completed?
Respuesta
-
A. Zero knowledge
-
B. Help desk spoofing
-
C. Social engineering
-
D. Black box
Pregunta 17
Pregunta
In this image, what issue may occur due to the log handling settings?
Respuesta
-
A. Log data may be lost when the log is archived.
-
B. Log data may be overwritten.
-
C. Log data may not include needed information.
-
D. Log data may fill the system disk.
Pregunta 18
Pregunta
Which of the following is not a hazard associated with penetration
testing?
Pregunta 19
Pregunta
Which NIST special publication covers the assessment of security and
privacy controls?
Respuesta
-
A. 800-12
-
B. 800-53A
-
C. 800-34
-
D. 800-86
Pregunta 20
Pregunta
If Kara’s primary concern is preventing eavesdropping attacks, which
port should she block?
Respuesta
-
A. 22
-
B. 80
-
C. 443
-
D. 1433
Pregunta 21
Pregunta
If Kara’s primary concern is preventing administrative connections to
the server, which port should she block?
Respuesta
-
A. 22
-
B. 80
-
C. 443
-
D. 1433
Pregunta 22
Pregunta
During a third-party audit, Jim’s company receives a finding that
states, “The administrator should review backup success and failure
logs on a daily basis, and take action in a timely manner to resolve
reported exceptions.” What is the biggest issue that is likely to result if
Jim’s IT staff need to restore from a backup?
Respuesta
-
A. They will not know if the backups succeeded or failed.
-
B. The backups may not be properly logged.
-
C. The backups may not be usable.
-
D. The backup logs may not be properly reviewed.
Pregunta 23
Pregunta
Jim is helping his organization decide on audit standards for use
throughout their international organization. Which of the following is
not an IT standard that Jim’s organization is likely to use as part of its
audits?
Respuesta
-
A. COBIT
-
B. SSAE-18
-
C. ITIL
-
D. ISO 27002
Pregunta 24
Pregunta
Which of the following best describes a typical process for building
and implementing an Information Security Continuous Monitoring
program as described by NIST Special Publication 800-137?
Respuesta
-
A. Define, establish, implement, analyze and report, respond, review,
and update
-
B. Design, build, operate, analyze, respond, review, revise
-
C. Prepare, detect and analyze, contain, respond, recover, report
-
D. Define, design, build, monitor, analyze, react, revise
Pregunta 25
Pregunta
Lauren’s team conducts regression testing on each patch that they
release. What key performance measure should they maintain to
measure the effectiveness of their testing?
Respuesta
-
A. Time to remediate vulnerabilities
-
B. A measure of the rate of defect recurrence
-
C. A weighted risk trend
-
D. A measure of the specific coverage of their testing
Pregunta 26
Pregunta
Which of the following types of code review is not typically performed
by a human?
Pregunta 27
Pregunta
Susan is the lead of a Quality Assurance team at her company. The
team has been tasked with the testing for a major release of their
company’s core software product.
Susan’s team of software testers are required to test every code path,
including those that will only be used when an error condition occurs.
What type of testing environment does her team need to ensure
complete code coverage?
Respuesta
-
A. White box
-
B. Gray box
-
C. Black box
-
D. Dynamic
Pregunta 28
Pregunta
Susan is the lead of a Quality Assurance team at her company. The
team has been tasked with the testing for a major release of their
company’s core software product.
As part of the continued testing of their new application, Susan’s
quality assurance team has designed a set of test cases for a series of
black box tests. These functional tests are then run, and a report is
prepared explaining what has occurred. What type of report is
typically generated during this testing to indicate test metrics?
Respuesta
-
A. A test coverage report
-
B. A penetration test report
-
C. A code coverage report
-
D. A line coverage report
Pregunta 29
Pregunta
Susan is the lead of a Quality Assurance team at her company. The
team has been tasked with the testing for a major release of their
company’s core software product.
As part of their code coverage testing, Susan’s team runs the analysis
in a non-production environment using logging and tracing tools.
Which of the following types of code issues is most likely to be missed
during testing due to this change in the operating environment?
Pregunta 30
Pregunta
Robin recently conducted a vulnerability scan and found a critical
vulnerability on a server that handles sensitive information. What
should Robin do next?
Respuesta
-
A. Patching
-
B. Reporting
-
C. Remediation
-
D. Validation
Pregunta 31
Pregunta
Kathleen is reviewing the code for an application. She first plans the
review, conducts an overview session with the reviewers and assigns
roles, and then works with the reviewers to review materials and
prepare for their roles. Next, she intends to review the code, rework it,
and ensure that all defects found have been corrected. What type of
review is Kathleen conducting?
Respuesta
-
A. A dynamic test
-
B. Fagan inspection
-
C. Fuzzing
-
D. A Roth-Parker review
Pregunta 32
Pregunta
Danielle wants to compare vulnerabilities she has discovered in her
data center based on how exploitable they are, if exploit code exists,
and how hard they are to remediate. What scoring system should she
use to compare vulnerability metrics like these?
Respuesta
-
A. CSV
-
B. NVD
-
C. VSS
-
D. CVSS
Pregunta 33
Pregunta
During a port scan of his network, Alex finds that a number of hosts
respond on TCP ports 80, 443, 515, and 9100 in offices throughout his
organization. What type of devices is Alex likely discovering?
Pregunta 34
Pregunta
Nikto, Burp Suite, and Wapiti are all examples of what type of tool?
Pregunta 35
Pregunta
Jim is working with a penetration testing contractor who proposes
using Metasploit as part of her penetration testing effort. What should
Jim expect to occur when Metasploit is used?
Respuesta
-
A. Systems will be scanned for vulnerabilities.
-
B. Systems will have known vulnerabilities exploited.
-
C. Services will be probed for buffer overflow and other unknown
flaws.
-
D. Systems will be tested for zero-day exploits.
Pregunta 36
Pregunta
Susan needs to ensure that the interactions between the components
of her e-commerce application are all handled properly. She intends to
verify communications, error handling, and session management
capabilities throughout her infrastructure. What type of testing is she
planning to conduct?
Respuesta
-
A. Misuse case testing
-
B. Fuzzing
-
C. Regression testing
-
D. Interface testing
Pregunta 37
Pregunta
Jim is designing his organization’s log management systems and
knows that he needs to carefully plan to handle the organization’s log
data. Which of the following is not a factor that Jim should be
concerned with?
Respuesta
-
A. The volume of log data
-
B. A lack of sufficient log sources
-
C. Data storage security requirements
-
D. Network bandwidth
Pregunta 38
Pregunta
Ken is having difficulty correlating information from different security
teams in his organization. Specifically, he would like to find a way to
describe operating systems in a consistent fashion. What SCAP
component can assist him?
Respuesta
-
A. CVE
-
B. CPE
-
C. CWE
-
D. OVAL
Pregunta 39
Pregunta
When a Windows system is rebooted, what type of log is generated?
Respuesta
-
A. Error
-
B. Warning
-
C. Information
-
D. Failure audit
Pregunta 40
Pregunta
During a review of access logs, Alex notices that Danielle logged into
her workstation in New York at 8 a.m. daily but that she was recorded
as logging into her department’s main web application shortly after 3
a.m. daily. What common logging issue has Alex likely encountered?
Pregunta 41
Pregunta
What type of vulnerability scan accesses configuration information
from the systems it is run against as well as information that can be
accessed via services available via the network?
Respuesta
-
A. Authenticated scans
-
B. Web application scans
-
C. Unauthenticated scans
-
D. Port scans
Pregunta 42
Pregunta
Ben’s organization has begun to use STRIDE to assess its software
and has identified threat agents and the business impacts that
these threats could have. Now they are working to identify
appropriate controls for the issues they have identified.
Ben’s development team needs to address an authorization issue,
resulting in an elevation of privilege threat. Which of the following
controls is most appropriate to this type of issue?
Respuesta
-
A. Auditing and logging is enabled.
-
B. Role-based access control is used for specific operations.
-
C. Data type and format checks are enabled.
-
D. User input is tested against a whitelist.
Pregunta 43
Pregunta
Ben’s organization has begun to use STRIDE to assess its software
and has identified threat agents and the business impacts that
these threats could have. Now they are working to identify
appropriate controls for the issues they have identified.
Ben’s team is attempting to categorize a transaction identification
issue that is caused by use of a symmetric key shared by multiple
servers. What STRIDE category should this fall into?
Pregunta 44
Pregunta
Ben’s organization has begun to use STRIDE to assess its software
and has identified threat agents and the business impacts that
these threats could have. Now they are working to identify
appropriate controls for the issues they have identified.
Ben wants to prevent or detect tampering with data. Which of the
following is not an appropriate solution?
Pregunta 45
Pregunta
Chris is troubleshooting an issue with his organization’s SIEM
reporting. After analyzing the issue, he believes that the timestamps
on log entries from different systems are inconsistent. What protocol
can he use to resolve this issue?
Respuesta
-
A. SSH
-
B. FTP
-
C. TLS
-
D. NTP
Pregunta 46
Pregunta
Ryan is considering the use of fuzz testing in his web application
testing program. Which one of the following statements about fuzz
testing should Ryan consider when making his decision?
Respuesta
-
A. Fuzzers only find complex faults.
-
B. Testers must manually generate input.
-
C. Fuzzers may not fully cover the code.
-
D. Fuzzers can’t reproduce errors.
Pregunta 47
Pregunta
Ken is designing a testing process for software developed by his team.
He is designing a test that verifies that every line of code was executed
during the test. What type of analysis is Ken performing?
Respuesta
-
A. Branch coverage
-
B. Condition coverage
-
C. Function coverage
-
D. Statement coverage
Pregunta 48
Pregunta
During a port scan, Ben uses nmap’s default settings and sees the following
results.
If Ben is conducting a penetration test, what should his next step be
after receiving these results?
Respuesta
-
A. Connect to the web server using a web browser.
-
B. Connect via Telnet to test for vulnerable accounts.
-
C. Identify interesting ports for further scanning.
-
D. Use sqlmap against the open databases.
Pregunta 49
Pregunta
During a port scan, Ben uses nmap’s default settings and sees the following
results.
Based on the scan results, what operating system (OS) was the system
that was scanned most likely running?
Respuesta
-
A. Windows Desktop
-
B. Linux
-
C. Network device
-
D. Windows Server
Pregunta 50
Pregunta
During a port scan, Ben uses nmap’s default settings and sees the following
results.
Ben’s manager expresses concern about the coverage of his scan. Why
might his manager have this concern?
Respuesta
-
A. Ben did not test UDP services.
-
B. Ben did not discover ports outside the “well-known ports.”
-
C. Ben did not perform OS fingerprinting.
-
D. Ben tested only a limited number of ports.