: s: e:
Mod 02 Setting Up a Penetration Testing Lab
1. When training for penetration testing, a sandbox environment is commonly used. Which of the following best
describes a sandbox?
a. An isolated environment that allows you to experiment
b. An area used to test hardware
c. An open environment that allows you to experiment
d. An area to solve problems with dirty equipment
ANSWER: a
RATIONALE: A sandbox is an isolated software testing environment used to develop skills and methods
in a restricted environment.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTI Wils.Pentest+1E.24.2.1 - Explain the purpose of a penetration testing lab.
VES:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
2. To install an operating system in a virtual machine you must load the OS using an image of the optical
installation disk (CD/DVD/Bluray). This is because there is not a physical optical disk drive on a virtual system.
This file type uses which of the following file extensions?
a. ISO
b. DMG
c. EXT
d. IMG
ANSWER: a
RATIONALE: An ISO file is a single file that represents the contents of an entire optical disk and is often
used to install an OS in a virtual machine.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJEC Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
TIVES:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
Copyright Cengage Learning. Powered by Cognero. Page 1
,Name Clas Dat
: s: e:
Mod 02 Setting Up a Penetration Testing Lab
3. Instead of manually installing an OS in a virtual machine, some vendors offer a preconfigured virtual
machine. These devices are then imported as an appliance to the virtualization hypervisor. These systems are
known as what?
a. OVA
b. AVO
c. ISO
d. VMI
ANSWER: a
RATIONALE: OVAs (Open Virtual Appliances) can be a great solution to get your pen testing sandbox
up and running quickly.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTI Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
VES:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
4. A virtualization platform is used to accomplish what?
a. To simulate a hardware device with an installed operating system
b. To simulate an environment that allows the user to see the hardware
c. To insert software glitches and allow a user to fix the problem
d. To overwrite the OS of the system and experiment with something new
ANSWER: a
RATIONALE: A virtualization platform manages virtual machines that have an operating system
installed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES Wils.Pentest+1E.24.2.1 - Explain the purpose of a penetration testing lab.
:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
5. You are attempting to install an appliance into Oracle's VirtualBox hypervisor. Which menu path is utilized to
accomplish this?
Copyright Cengage Learning. Powered by Cognero. Page 2
,Name Clas Dat
: s: e:
Mod 02 Setting Up a Penetration Testing Lab
a. File->Import Appliance
b. Machine->Import Appliance
c. File->Add New Appliance
d. Machine->New Appliance
ANSWER: a
RATIONALE: The correct menu pathway to import an appliance is to select File from the menu bar, then
select Import Appliance.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTI Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
VES:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Apply
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
6. Frequent backups should be utilized when making changes to a system or hardware device. These backups
can help restore a device should it be compromised or malfunction. Virtualized environments are no different,
but these unique environments allow for a special type of configuration capture known as what?
a. Snapshot
b. Image capture
c. Screenshot
d. ISO image
ANSWER: a
RATIONALE: Snapshots are used to capture the system configuration and current state. They allow for quick
restoration if a system malfunctions or is compromised. Snapshots are sometimes called
checkpoints.
POINTS: 1
QUESTION TYPE Multiple Choice
:
HAS VARIABLES: False
LEARNING OBJE Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
CTIVES:
TOPICS: 2.1 Penetration Testing Lab Overview
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIE 3/29/2023 12:44 PM
D:
Copyright Cengage Learning. Powered by Cognero. Page 3
, Name Clas Dat
: s: e:
Mod 02 Setting Up a Penetration Testing Lab
7. To find the ip configuration of a Linux operating system node, which of the following commands should be
run in Terminal?
a. ifconfig
b. ipconfig
c. arp
d. netstat
ANSWER: a
RATIONALE: ifconfig is used to display the ip configuration of a Linux node.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
TOPICS: 2.3 Setting Up Targets
KEYWORDS: Bloom's: Remember/Apply
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
8. Which of the following commands can be used to display the Internet protocol information of a NIC on a
Windows node?
a. ipconfig
b. ifconfig
c. arp
d. netstat
ANSWER: a
RATIONALE: ipconfig is used to display the ip configuration of a Windows node.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Wils.Pentest+1E.24.2.3 - Describe how to set up a virtual machine.
TOPICS: 2.3 Setting Up Targets
KEYWORDS: Bloom's: Remember/Apply
DATE CREATED: 3/29/2023 12:44 PM
DATE MODIFIED: 3/29/2023 12:44 PM
9. Jameson has just configured his pen testing lab and wants to export his virtual machines from VirtualBox so
that his partner, Lenora, can then import them into her computer. She uses the Microsoft Hyper-V virtualization
software and wants to make sure the appliances will work for her. Which format of virtual hard disk will
Jameson need to have used during his setup to make this process easiest?
a. VHD
Copyright Cengage Learning. Powered by Cognero. Page 4