Preview

03 - Penetration Testing

 1. A penetration test, colloquially known as a pen test, is an _______________________ on a computer system, performed to evaluate the security of the system

  authorized simulated attack

  unauthorised unsimulated attack

  unauthorised simulated attack

  authorised and irreversibly destructive attack (such that the system will not recover)

 2. Fill in the blanks in the following excerpt on pen testing.
The test is performed to identify both ___________ (also referred to as 
vulnerabilities), including the potential for unauthorized parties 
to gain access to the system's features and data, as well as ________, 
enabling a full risk assessment to be completed.

  malware / encryption weaknesses

  viruses / malware

  weaknesses / strengths

  potential hackers / good anti virus firewalls

 3. The process typically identifies the ____________ and a particular goal—then reviews available information and undertakes various means to attain the goal

  PC monitor under investigation

  target systems

  government

  hacker in question

 4. There are typically two well known types of penetration test targets: What are they?

  Red and Yellow

  Black and White

  Normal and Boundary

  Fluid and Static

 5. Penetration testing can never be carried out manually by individuals who are capable of carrying out attacks.

  TRUE

  FALSE

 6. Hackers that carry out penetration testing are sometimes called:

  There is no such thing - only computer systems can penetration test, not humans

  ethical hackers or white-hat hackers

  Boundary testers

  penepen testers

 7. White box testing assumes knowledge of the internals of the systems.

  FALSE

  TRUE

 8. White box testing would simulate an attack from someone with:

  a detailed and insider knowledge of the system

  Very little knowledge of the system (hence the term 'white') lmited to the system colours

  a vague if not non-existent knowledge of the system

  absolutely no knowledge of the system except for its location and name

 9. The aim of black box testing may be to:

  simulate a full on cyberwarfare attack (e.g. flooding the servers with more requests than can be handled)

  see if the system meets the criteria of the 'black book' held by the governent

  simulate an attack on the system with full knowledge of the inside of the system and the code.

  see if the system can be contained in a black box

 10. Under budget and time constraints, ______ is a common technique that discovers vulnerabilities. It aims to get an unhandled error through random input
You may need to research this one!

  nuzzing

  kuzzing

  fuzzing

  muzzing