100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CS6262 - Penetration testing Questions And Quality Answers

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
22-03-2025
Written in
2024/2025

Pentesting Methodology - Correct Answer Footprinting, Scanning, Enumeration, Gaining Access, Escalating Privileges, Pilfering, Covering Tracks, Creating Back Doors Footprinting - Correct Answer Recon and Information gathering; Target IP discovery; Namespace acquisition; Network topology Scanning - Correct Answer Find target machine, ports, services (versions & configs); ID related vulnerabilities and focus on most promising Enumeration - Correct Answer ID valid user accounts or poorly protected resources shares; More intrusive probing than scanning Gaining Access - Correct Answer ID a vulnerability of the target from scannning; Exploit the vuln. Escalating privileges - Correct Answer If only user-level access was obtained in the last step, seek to gain complete control of the system Pilfering - Correct Answer Gather info to allow access of trusted systems Covering Tracks - Correct Answer Once total ownership of the target is secured, hiding this fact from sysadmins becomes paramount Creating backdoors - Correct Answer Trap door will be laid in various parts of the system to ensure that privilege access is easily regained whenever the intruder decides Events that trigger a pentest - Correct Answer Added or modified infrastructure Added or modified applications End us

Show more Read less
Institution
CS6262
Course
CS6262








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CS6262
Course
CS6262

Document information

Uploaded on
March 22, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CS6262 - Penetration testing Questions And Quality Answers
Pentesting Methodology - Correct Answer Footprinting, Scanning, Enumeration, Gaining
Access, Escalating Privileges, Pilfering, Covering Tracks, Creating Back Doors



Footprinting - Correct Answer Recon and Information gathering; Target IP discovery;
Namespace acquisition; Network topology



Scanning - Correct Answer Find target machine, ports, services (versions & configs); ID related
vulnerabilities and focus on most promising



Enumeration - Correct Answer ID valid user accounts or poorly protected resources shares;
More intrusive probing than scanning



Gaining Access - Correct Answer ID a vulnerability of the target from scannning; Exploit the
vuln.



Escalating privileges - Correct Answer If only user-level access was obtained in the last step,
seek to gain complete control of the system



Pilfering - Correct Answer Gather info to allow access of trusted systems



Covering Tracks - Correct Answer Once total ownership of the target is secured, hiding this fact
from sysadmins becomes paramount



Creating backdoors - Correct Answer Trap door will be laid in various parts of the system to
ensure that privilege access is easily regained whenever the intruder decides



Events that trigger a pentest - Correct Answer Added or modified infrastructure

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lydiah247 West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
29
Member since
2 year
Number of followers
10
Documents
2870
Last sold
1 month ago
SHINE

Welcome to my page- you are able to get revision questions,Summary notes and Exams that help you pass .

2.2

5 reviews

5
1
4
0
3
1
2
0
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions