1. Right Answer: A
Explanation: In this report the detected vulnerabilities are mentioned along with their risk level in red, orange, blue, and green colors indicating high, medium, low and informational findings and the overall risk is high. Vulnerabilities are also formated with their CVSS and CVE codes. Affected programs are also reported.
2. Right Answer: C
Explanation: Assets to be targeted are items that are owned, operated, or deployed by the client organization-in short, anything for which the client organization can explicitly and definitively provide authorization for testing. Such assets include (but are not limited to) personnel, business processes, facilities, and technologies. While it is not unusual for employees to have personal business emails (such as those pertaining to their personal online banking).
3. Right Answer: B,C
Explanation: Technical constraints of an organization are the specific technological challenge that could significantly impact an organization such as mission-critical hosts or delicate legacy equipment that are scheduled for replacement.
4. Right Answer: B
Explanation: The point-in-time assessment types are compliance-based and goals-based testing. Compliance-based testing assesses an organization-s ability to follow and implement a given set of security standards within its environment while, goals-based testing is more strategic in nature and focuses on the penetration tester working to complete a specific desired outcome.
5. Right Answer: C,D
Explanation: User Enumeration is used when an attacker tries to recover valid user information from a web application. The registration form pages, login pages, or password reset pages on web applications are commonly vulnerable to this kind of attack.
Leave a comment