Solution and Answer Guide
WILSON, PENTEST +: GUIDE TO PENETRATION TESTING 2024, 9780357445266; M ODULE 02: SETTING
UP A PENETRATION TESTING LAB
TABLE OF CONTENTS
Review Questions.......................................................................................................................................1
REVIEW QUESTIONS
1. What is VirtualBox?
a. A vulnerability testing tool.
b. A virtualization platform.
c. A set of cloud-based hacking tools.
d. An online file storage solution.
Answer: b
VirtualBox is a software package provided free-of-charge by the Oracle company. It is arguably the
best of the free-of-charge virtualization options.
2. Kali Linux is widely used by pen testers because it’s free and comes with many pen-testing tools already
installed.
a. True
b. False
Answer: a
Kali Linux is a free, open-sourced variant of Debian Linux and is popular with pen testers because it
includes built-in pen-testing tools.
3. What is an OVA?
a. An Open Virus Attack.
b. An Online Virtual Application.
c. An Oracle Virtual Appliance.
d. An Open Virtual Appliance.
Answer: d
Open virtual appliances are preconfigured virtual machines that can be imported into virtualization
platforms such as VirtualBox and VMware Workstation.
4. What is Metasploitable2?
a. A purposefully vulnerable virtual machine useful for practicing pen testing.
b. A pen-testing framework.
c. A type of malware.
d. A pen-testing application.
© 2022 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible 1
website, in whole or in part.
, Solution and Answer Guide: Wilson, PenTest+: Guide to Penetration Testing 2024,
Answer: a
Metasploitable2 was created and provided by the Rapid7 company so that pen testers could practice
pen testing and using Rapid7 tools.
5. Which two of the following commands reveal IP address information on a Linux machine?
a. ipconfig
b. show ip addr brief
c. ip addr
d. ifconfig
Answers: c, d
These commands show slightly different information, but both show IP address details.
6. Use your favorite search engine to research virtualization platforms. Write a one-page report listing and
describing three different virtualization platforms.
A good answer will be approximately one-page long. Virtualization platforms such as Hyper-V,
VMWare, Zen, ESXi, and VSphere are likely topics.
7. When did Windows 7 reach the end of its life?
a. January 2022
b. April 2021
c. January 2020
d. Windows 7 is still supported.
Answer: c
All companies eventually end the life of their software products. Supporting them forever is
administratively too demanding and financially unfeasible.
8. What percentage of computers still run Windows 7?
a. 1
b. 5
c. 10
d. 12
Answer: d
Many users find that Windows 7 is the best version of Microsoft Windows and are reluctant to switch.
9. What Windows command displays useful IP configuration information such as the IP address assigned to a
network interface?
a. ipconfig
b. show ip addr brief
c. ip addr
d. ifconfig
Answer: a
© 2022 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible 2
website, in whole or in part.
, Solution and Answer Guide: Wilson, PenTest+: Guide to Penetration Testing 2024,
The ipconfig command provides IP information such as IP address, subnet mask, and default
gateway. This command is similar to the Linux ifconfig command.
10. Approximately how many devices worldwide currently run Windows 10?
a. 1 billion
b. 10 billion
c. 3.14159 billion
d. 1.3 billion
Answer: d
Windows 10 is the most popular operating system worldwide and can be found in all kinds of devices
including desktops, laptops, and Internet of Things (IoT) devices.
11. How can a Windows Server be made into a domain controller?
a. By adding the Domain Controller role
b. By adding the Active Directory Domain Services role
c. By adding the Active Directory Domain Services feature
d. It cannot be made into a domain controller.
Answer: b
The capabilities of an initial installation of Windows Server can be extended by adding supported roles
and features, including the Active Directory Domain Services role. Roles are used to add large-scale
and complex functional capabilities, and features are used to add simpler ones.
12. What kinds of pen-testing activities can you perform against the DVWA target? (Choose all that apply)
a. Vulnerability discovery
b. SQL injection exploits
c. Brute force attack exploits
d. Social engineering attacks
Answers: a, b, c
DVWA is the Damn Vulnerable Web Application provided by dvwa.co.uk. It has a variety of
interfaces that can be used to practice many types of pen-testing attacks.
13. Perform an Internet search for mail server vulnerabilities affecting Axigen and Microsoft Exchange mail
servers. Write a one-page report outlining your findings. Include CVE numbers and what versions of
Axigen and Exchange they apply to.
A good answer will be approximately one-page long. There will be dozens of Microsoft Exchange
CVEs to choose from. Microsoft Exchange suffered serious security issues in 2020 and 2021.
© 2022 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible 3
website, in whole or in part.
, Solution and Answer Guide: Wilson, PenTest+: Guide to Penetration Testing 2024,
Solution and Answer Guide
WILSON, PENTEST +: GUIDE TO PENETRATION TESTING 2024, 9780357445266; M ODULE 03:
PLANNING AND SCOPING
TABLE OF CONTENTS
Review Questions.......................................................................................................................................1
Activities.....................................................................................................................................................4
Case Projects..............................................................................................................................................5
REVIEW QUESTIONS
1. Before any hands-on pen- testing activities take place, the entire pen- testing engagement must be carefully
and completely planned.
a. True
b. False
Answer: a
Planning helps determine what targets to test, what targets not to test, what tests to perform, and when
to perform them.
2. What is governance?
a. Government regulations that must be taken into consideration during pen testing.
b. Practices that ensure organizational activities are aligned to support the organization’s business
goals.
c. Governance is what the “G” in “GDPR” stands for.
d. Confirming that all organizational activities meet organizational policies, jurisdictional laws, and
regulations.
Answer: b
When you think of governance, think of governors overseeing the well-being of their states. Governors
should encourage and execute activities that benefit their states and constituents, while discouraging
and avoiding detrimental activities.
3. Which of the following are examples of regulatory compliances standards? Choose all that apply.
a. PCI DSS
b. GDPR
c. PCI SCC
d. DPO
Answer: a, b
© 2022 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible 1
website, in whole or in part.