In the context of penetration testing, what does blue teaming mean?
Correct Answer:A
Today, most organizations would agree that their most valuable IT assets reside within applications and databases. Most would probably also agree that these are areas that have the weakest levels of security, thus making them the prime target for malicious activity from system administrators, DBAs, contractors, consultants, partners, and customers.
Which of the following flaws refers to an application using poorly written encryption code to securely encrypt and store sensitive data in the database and allows an attacker to steal or modify weakly protected data such as credit card numbers, SSNs, and other authentication credentials?
Correct Answer:B
What is kept in the following directory? HKLMSECURITYPolicySecrets
Correct Answer:A
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?
Correct Answer:A
Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?
Correct Answer:A
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?
Correct Answer:C