<< Prev Question Next Question >>

Question 34/150

What is the difference between penetration testing and vulnerability testing?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: Vulnerability assessment is an examination of the ability of...
Question 2: A framework for security analysis is composed of a set of in...
Question 3: You have compromised a lower-level administrator account on ...
Question 4: You are conducting a penetration test against a company and ...
Question 5: The Internet is a giant database where people store some of ...
Question 6: Which of the following will not handle routing protocols pro...
Question 7: Which of the following is an application alert returned by a...
Question 8: Which of the following policy forbids everything with strict...
Question 9: When you are running a vulnerability scan on a network and t...
Question 10: Which of the following is a framework of open standards deve...
Question 11: Nessus can test a server or a network for DoS vulnerabilitie...
Question 12: Hackers today have an ever-increasing list of weaknesses in ...
Question 13: What sort of vulnerability assessment approach starts by bui...
Question 14: A penetration tester tries to transfer the database from the...
Question 15: Phishing is typically carried out by email spoofing or insta...
Question 16: One of the steps in information gathering is to run searches...
Question 17: Which of the following defines the details of services to be...
Question 18: What are placeholders (or markers) in an HTML document that ...
Question 19: Snort, an open source network-based intrusion detection sens...
Question 20: Identify the type of firewall represented in the diagram bel...
Question 21: Which of the following password hashing algorithms is used i...
Question 22: Passwords protect computer resources and files from unauthor...
Question 23: Which of the following are the default ports used by NetBIOS...
Question 24: Rules of Engagement (ROE) document provides certain rights a...
Question 25: Which of the following methods is used to perform server dis...
1 commentQuestion 26: From where can clues about the underlying application enviro...
Question 27: Which one of the following is false about Wireshark? (Select...
Question 28: In the TCP/IP model, the transport layer is responsible for ...
Question 29: TCP/IP model is a framework for the Internet Protocol suite ...
Question 30: Identify the person who will lead the penetration-testing pr...
Question 31: DMZ is a network designed to give the public access to the s...
Question 32: Many security and compliance projects begin with a simple id...
Question 33: TCP/IP provides a broad range of communication protocols for...
Question 34: What is the difference between penetration testing and vulne...
Question 35: In the process of hacking a web application, attackers manip...
Question 36: A man enters a PIN number at an ATM machine, being unaware t...
Question 37: Which one of the following components of standard Solaris Sy...
Question 38: Application security assessment is one of the activity that ...
Question 39: Which among the following information is not furnished by th...
Question 40: A directory traversal (or path traversal) consists in exploi...
1 commentQuestion 41: Which of the following acts related to information security ...
Question 42: Which one of the following tools of trade is a commercial sh...
Question 43: Timing is an element of port-scanning that can catch one una...
Question 44: A firewall protects networked computers from intentional hos...
Question 45: Identify the attack represented in the diagram below: (Exhib...
Question 46: Which of the following is not the SQL injection attack chara...
Question 47: John, the penetration testing manager in a pen testing firm,...
Question 48: Which one of the following is a useful formatting token that...
Question 49: A penetration test will show you the vulnerabilities in the ...
Question 50: Identify the framework that comprises of five levels to guid...
Question 51: In the example of a /etc/passwd file below, what does the bo...
Question 52: Packet filtering firewalls are usually a part of a router. I...
Question 53: A penetration test consists of three phases: pre-attack phas...
Question 54: What threat categories should you use to prioritize vulnerab...
Question 55: Attackers create secret accounts and gain illegal access to ...
Question 56: Which of the following protocols cannot be used to filter Vo...
Question 57: Which of the following appendices gives detailed lists of al...
1 commentQuestion 58: Which of the following statement holds true for TCP Operatio...
Question 59: What is a goal of the penetration testing report? (Exhibit)...
Question 60: Which one of the following log analysis tools is a Cisco Rou...
Question 61: Which one of the following components of standard Solaris Sy...
Question 62: What is the maximum value of a "tinyint" field in most datab...
Question 63: In which of the following IDS evasion techniques does IDS re...
Question 64: Which of the following is NOT related to the Internal Securi...
Question 65: What are the 6 core concepts in IT security? (Exhibit)...
Question 66: Metasploit framework in an open source platform for vulnerab...
Question 67: Nessus can test a server or a network for DoS vulnerabilitie...
Question 68: External penetration testing is a traditional approach to pe...
Question 69: Variables are used to define parameters for detection, speci...
Question 70: Identify the injection attack represented in the diagram bel...
Question 71: Which one of the following 802.11 types has WLAN as a networ...
Question 72: Output modules allow Snort to be much more flexible in the f...
Question 73: What are the scanning techniques that are used to bypass fir...
Question 74: Firewall and DMZ architectures are characterized according t...
1 commentQuestion 75: Which of the following is developed to address security conc...
Question 76: Today, most organizations would agree that their most valuab...
Question 77: What is a difference between host-based intrusion detection ...
Question 78: Which one of the following acts related to the information s...
Question 79: Identify the type of testing that is carried out without giv...
Question 80: Which of the following policies helps secure data and protec...
Question 81: Why is a legal agreement important to have before launching ...
Question 82: You work as an IT security auditor hired by a law firm in Bo...
Question 83: Which vulnerability assessment phase describes the scope of ...
Question 84: The amount of data stored in organizational databases has in...
Question 85: A pen tester has extracted a database name by using a blind ...
Question 86: Identify the data security measure which defines a principle...
Question 87: Which of the following attacks does a hacker perform in orde...
Question 88: The Web parameter tampering attack is based on the manipulat...
Question 89: The IP protocol was designed for use on a wide variety of tr...
Question 90: Rule of Engagement (ROE) is the formal permission to conduct...
Question 91: By default, the TFTP server listens on UDP port 69. Which of...
Question 92: Mason is footprinting an organization to gather competitive ...
Question 93: Which one of the following is a command line tool used for c...
Question 94: Internet Control Message Protocol (ICMP) messages occur in m...
Question 95: An external intrusion test and analysis identify security we...
Question 96: A chipset is a group of integrated circuits that are designe...
Question 97: This is a group of people hired to give details of the vulne...
Question 98: Identify the policy that defines the standards for the organ...
Question 99: The SnortMain() function begins by associating a set of hand...
Question 100: John, a penetration tester, was asked for a document that de...
Question 101: What information can be collected by dumpster diving?...
Question 102: Which of the following policies states that the relevant app...
Question 103: Software firewalls work at which layer of the OSI model?...
Question 104: Which one of the following tools of trade is an automated, c...
Question 105: A Demilitarized Zone (DMZ) is a computer host or small netwo...
Question 106: Which of the following is the objective of Gramm-Leach-Blile...
Question 107: In the context of penetration testing, what does blue teamin...
Question 108: DNS information records provide important data about:...
Question 109: Which of the following approaches to vulnerability assessmen...
Question 110: Which of the following protocol's traffic is captured by usi...
Question 111: Internet Control Message Protocol (ICMP) messages occur in m...
Question 112: Before performing the penetration testing, there will be a p...
Question 113: Which type of security policy applies to the below configura...
Question 114: Transmission control protocol accepts data from a data strea...
Question 115: Traceroute is a computer network diagnostic tool for display...
Question 116: Port numbers are used to keep track of different conversatio...
1 commentQuestion 117: Wireshark is a network analyzer. It reads packets from the n...
Question 118: Which type of vulnerability assessment tool provides securit...
Question 119: In a TCP packet filtering firewall, traffic is filtered base...
Question 120: Windows stores user passwords in the Security Accounts Manag...
Question 121: How many bits is Source Port Number in TCP Header packet?...
Question 122: Port numbers are used to keep track of different conversatio...
Question 123: Which of the following statements is true about the LM hash?...
Question 124: A wireless intrusion detection system (WIDS) monitors the ra...
Question 125: James is testing the ability of his routers to withstand DoS...
Question 126: An automated electronic mail message from a mail system whic...
Question 127: Which one of the following 802.11 types uses either FHSS or ...
Question 128: SQL injection attack consists of insertion or "injection" of...
Question 129: An attacker injects malicious query strings in user input fi...
Question 130: Which Wireshark filter displays all the packets where the IP...
Question 131: Which of the following shields Internet users from artificia...
Question 132: Wireless communication allows networks to extend to places t...
Question 133: Transmission Control Protocol (TCP) is a connection-oriented...
Question 134: Which one of the following log analysis tools is used for an...
Question 135: Due to illegal inputs, various types of TCP stacks respond i...
Question 136: During external penetration testing, which of the following ...
Question 137: During the process of fingerprinting a web application envir...
Question 138: A Blind SQL injection is a type of SQL Injection attack that...
Question 139: Which of the following scan option is able to identify the S...
Question 140: Which of the following equipment could a pen tester use to p...
Question 141: An antenna is a device that is designed to transmit and rece...
Question 142: Which of the following acts is a proprietary information sec...
Question 143: Amazon, an IT based company, conducts a survey on the usage ...
Question 144: Amazon Consulting Corporation provides penetration testing a...
Question 145: NTP protocol is used to synchronize the system clocks of com...
Question 146: The framework primarily designed to fulfill a methodical and...
Question 147: In which of the following firewalls are the incoming or outg...
Question 148: Which of the following contents of a pen testing project pla...
Question 149: Besides the policy implications of chat rooms, Internet Rela...
2 commentQuestion 150: Identify the transition mechanism to deploy IPv6 on the IPv4...