QUESTION AND VERIFIED ANSWERS GRADED A+
What type of tests would be most important to conduct to find out whether there are any
poorly secured firewalls, routers, and switches on a LAN?
a. Web application tests
b. Network infrastructure tests
c. Wireless network tests
d. Physical facility tests - Answer b. Network infrastructure tests
What type of tests would be most important to conduct to find out whether unauthorized
people can reach the company's server rooms?
a. Web application tests
b. Network infrastructure tests
c. Wireless network tests
d. Physical facility tests - Answer d. Physical facility tests
Which testing methodology involves seven phases, including pre-engagement
interactions, intelligence gathering, threat modeling, and vulnerability analysis?
a. PTES
b. PCI DSS
c. Penetration Testing Framework
d. OSSTMM - Answer PTES
Which of the following would an ethical hacker not participate in?
a. Unauthorized access
b. Responsible disclosure
c. Documentation
d. Black-box testing - Answer a. Unauthorized access
, What type of tests would be most important to conduct to find out whether hackers
could use the Internet to compromise your client's online ordering system?
a. Web application tests
b. Network infrastructure tests
c. Wireless network tests
d. Physical facility tests - Answer a. Web application tests
Which of these is not a financial institution, by the definition of the Gramm-Leach-Bliley
Act (GLBA)?
Select one:
a. Real estate appraisers
b. Check-cashing businesses
c. Debt collectors
d. None of the above - Answer d. None of the above
What type of attack encrypts user files until the victim pays a fee?
a. Ransomware
b. Denial of Service attack
c. Hacktivism
d. Shoulder surfing - Answer a. Ransomware
Which testing methodology has key sections including Operational Security Metrics,
Trust Analysis, Work Flow, and Human Security Testing?
a. PTES
b. PCI DSS
c. Penetration Testing Framework
d. OSSTMM - Answer d. OSSTMM
What document created by the National Institute of Standards and Technology provides
organizations with guidelines on planning and conducting information security testing?