Which of the following is the most secure way to protect a final report file when delivering the report to the client/customer?
* Using PGP (Pretty Good Privacy) encryption ensures that the report file is securely encrypted with the client's public key. Only the client can decrypt the file using their private key, ensuring confidentiality during transit.
* Details:
Option Analysis:
A . Creating a link on a cloud service and delivering it by email: This method is susceptible to interception or unauthorized access.
B . Asking for a PGP public key to encrypt the file: Provides end-to-end encryption ensuring that only the intended recipient can access the file.
C . Requiring FTPS security to download the file: While secure, it does not provide the same level of end-to-end encryption as PGP.
D . Copying the file on a USB drive and delivering it by postal mail: While physically secure, it is not practical and poses a risk of loss or theft.
* Reference: PGP encryption is a widely accepted method for securing sensitive data. It is recommended by many cybersecurity standards and best practice guides.
During an engagement, a junior penetration tester found a multihomed host that led to an unknown network segment. The penetration tester ran a port scan against the network segment, which caused an outage at the customer's factory. Which of the following documents should the junior penetration tester most likely follow to avoid this issue in the future?
* Rules of Engagement (ROE) documents outline the scope, boundaries, and rules for a penetration test to prevent unintended consequences such as network outages.
* Details:
NDA (Non-Disclosure Agreement): Protects confidential information but does not provide guidelines for engagement.
MSA (Master Service Agreement): General terms and conditions for services but does not detail specific engagement rules.
ROE (Rules of Engagement): Specifies the limits and guidelines for testing, including which systems can be tested, when, and how, to avoid disruptions.
SLA (Service Level Agreement): Defines the level of service expected but does not guide the testing process.
* Reference: ROE is a critical document in penetration testing engagements to ensure both the tester and client are aligned on the scope and limitations, as outlined in various penetration testing standards and methodologies.
Which of the following is the most important to include in the scope of a wireless security assessment?
* Access Points (APs) are crucial in a wireless security assessment as they are the main points through which devices connect to the network. Identifying and securing APs ensures network integrity and security.
* Details:
A . Frequencies: Important but not as critical as identifying and assessing APs.
B . APs: Central to the network's security; assessing AP configurations, placements, and security settings is essential.
C . SSIDs: Identifying SSIDs is part of the assessment but does not provide a complete picture without evaluating APs.
D . Signal strengths: Useful for understanding coverage but secondary to assessing AP security.
* Reference: Wireless security assessments prioritize AP evaluation as they are the entry points to the network, as outlined in various wireless security frameworks and methodologies.
As part of active reconnaissance, penetration testers need to determine whether a protection mechanism is in place to safeguard the target's website against web application attacks. Which of the following methods would be the most suitable?
* Detecting a Web Application Firewall (WAF) helps penetration testers understand the protective measures in place and tailor their testing methods to bypass these defenses.
* Details:
A . Direct-to-origin testing: Useful for bypassing CDN but not specifically for detecting protective mechanisms like WAF.
B . Antivirus scanning: Not relevant for web application attacks.
C . Scapy packet crafting: Useful for network-level testing but not for detecting web application protections.
D . WAF detection: Identifies if a WAF is present, which is critical for understanding and bypassing web application defenses.
* Reference: WAF detection techniques are documented in web application security testing methodologies such as OWASP.
During an assessment, a penetration tester found an application with the default credentials enabled. Which of the following best describes the technical control required to fix this issue?
* System hardening involves securing a system by reducing its surface of vulnerability, which includes changing default credentials, disabling unnecessary services, and applying security patches.
* Details:
A . Password encryption: Secures passwords but does not address the issue of default credentials.
B . System hardening: Comprehensive approach to securing the system, including changing default credentials.
C . Multifactor authentication: Adds an additional layer of security but does not solve the problem of default credentials being enabled.
D . Patch management: Ensures software is up-to-date but does not directly address default credentials.
* Reference: System hardening is a fundamental practice in securing systems and preventing unauthorized access, as detailed in security best practices and guidelines.
Elenore
12 hours agoKing
14 days agoMarya
17 days agoTemeka
25 days agoMichal
1 months agoLizbeth
2 months agoFrancene
3 months agoArlene
3 months agoAnastacia
3 months ago