Contents
Practice Exam 1
1. You have been asked to perform a penetration test for a medium-sized organization that sells after-market motorcycle parts online. What is the first task you should complete?
A. Research the organizations product offerings.
B. Determine the budget available for the test.
C. Identify the scope of the test.
D. Gain authorization to perform the test.
2. A consultant has been hired to perform a penetration test for an organization. The target of the test is the organizations proprietary design documents. The aim is to circumvent security measures and gain unauthorized access to these documents. What type of assessment is being conducted in this scenario?
A. Objective-based assessment
B. Goal-based assessment
C. Compliance-based assessment
D. Red team assessment
3. A consultant has been hired to perform a penetration test for an organization in the healthcare industry. The target of the test is a public-facing self-service website that users can access to view their health records. The aim is to circumvent security measures and gain unauthorized access to this information. What type of assessment is being conducted in this scenario?
A. Objective-based assessment
B. Gray box assessment
C. Compliance-based assessment
D. White box assessment
4. A consultant has been hired to perform a penetration test for an organization in the healthcare industry. The target of the test is a public-facing self-service website that users can access to view their health records. The penetration tester has been given full knowledge of the organizations underlying network. What type of test is being conducted in this example?
A. Goal-based assessment
B. Black box assessment
C. Objective-based assessment
D. White box assessment
5. In which type of penetration test does the tester have a limited amount of information about the target environment but is not granted full access?
A. Gray box assessment
B. Black box assessment
C. Compliance-based assessment
D. White box assessment
6. You have been asked to perform a black box penetration test for a medium-sized organization that sells imported motorcycles and ATVs online. In which phase of this assessment will you likely spend most of your time?
A. Planning and scoping
B. Information gathering and vulnerability identification
C. Attacking and exploiting
D. Reporting and communicating results
7. You are performing a black box penetration test for a medium-sized organization that sells imported motorcycles and ATVs through its online storefront. You need to discover who owns the organizations domain. Which tool in your penetration testing toolkit should you use?
A. nslookup
B. whois
C. Shodan
D. Maltego
8. You are performing a black box penetration test for a medium-sized organization that sells imported clothing through its online storefront. You need to discover which IP addresses are associated with the organizations domain. Which tool in your penetration testing toolkit should you use?
A. nslookup
B. whois
C. theHarvester
D. Fingerprinting Organizations with Collected Archives (FOCA)
9. You are performing a black box penetration test for a medium-sized organization that sells imported clothing through its online storefront. You want to query search engines and other resources to discover email addresses, employee names, and other details about the target. Which tool in your penetration testing toolkit should you use?
A. nmap
B. Shodan
C. theHarvester
D. Fingerprinting Organizations with Collected Archives (FOCA)
10. You are performing a black box penetration test for a large organization that wholesales imported electronic devices in the United States. You need to uncover any information you can find about the organization using open source intelligence (OSINT). Which tool in your penetration testing toolkit could you use to do this?
A. Censys
B. whois
C. recon-ng
D. Shodan
E. All of the above
11. You are conducting a black box penetration test for a client. You have used reconnaissance tools to create a list of employee email addresses within the target organization. You craft an email addressed to all of the employees warning them that they must change their password within 24 hours or they will lose access. When they click the link provided in the email, they are redirected to your own website where their credentials are captured to a text file. What kind of exploit did you use?
A. Phishing
B. Vishing
C. Smishing
D. Whaling
12. You are performing a gray box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify a help desk employee and a payroll employee. You craft an email to the payroll employee that appears to come from the help desk employee directing the payroll employee to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A. Phishing
B. Interrogation
C. Spear phishing
D. Whaling
13. You are performing a black box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify the CEOs email address as well as the email address belonging to a help desk employee. You craft an email to the CEO that appears to come from the help desk employee directing the CEO to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A. Smishing
B. Vishing
C. Spear phishing
D. Whaling
14. You are performing a black box penetration test for a medium-sized organization that sells imported clothing. You have used reconnaissance techniques to identify a key software developer. You send this employee a personalized text message containing a Bitly URL that points to your own website where you capture information to a text file.
What kind of exploit did you use in this scenario?
A. Phishing
B. Smishing
C. Vishing
D. Whaling
15. You are performing a black box penetration test for a small organization that wholesales imported electronic devices in the United States. You have used reconnaissance techniques to identify a receptionists phone number as well as the organizations printer vendor. You call this receptionist, pretending to be a sales rep from the vendor. You ask the receptionist for information about their printers, workstations, operating systems, and so on, to learn more about the organizations network infrastructure. What kind of exploit did you use in this scenario?
A. Smishing
B. Vishing
C. Spear phishing
D. Whaling
16. You are conducting a gray box penetration test for a client. You have identified an internal host with an IP address of 192.168.1.1 as a potential target. You need to use the nmap utility on your laptop to run a SYN port scan of this host. Which command should you use to do this?
A. nmap 192.168.1.1 -sS
B. nmap 192.168.1.1 -sT
C. nmap 192.168.1.1 -sU
D. nmap 192.168.1.1 -sA
17. You are conducting a white box penetration test for a client. You need to use the nmap utility on your laptop to run a scan of every host on the 192.168.1.0 subnet (which uses a subnet mask of 255.255.255.0). Which commands could you use to do this? (Choose two.)