Deck 4: Exploring Penetration Testing

ملء الشاشة (f)
exit full mode
سؤال
Which of the following biases involves making a decision before investigating and then only looking for data that supports the theory?

A) Present bias
B) Framing effect
C) Confirmation bias
D) Availability bias
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What term describes an expansion of a test beyond the initial set of the test's limitations?
سؤال
At which level of penetration testing are testers given limited knowledge of the network and some elevated privileges?

A) Gray box
B) White box
C) Black box
D) Yellow box
سؤال
______________ bias tends to discount future risks and gains in favor of immediate gratification.
سؤال
Which of the following is not considered an advantage of contracting with an external third party to conduct a penetration test?

A) Expertise
B) Focus
C) Experience
D) Cost
سؤال
What is the process of turning binary machine language back into source code?

A) Reverse engineering
B) Disassembling
C) Decomposition
D) Decompensation
سؤال
What term describes a network of vendors, manufacturers, and distributors that move a product from the supplier to the customer?
سؤال
Which of the following is the isolation of malware from interaction with a computer's operating system, hardware, and files?

A) Disassembling
B) Sandboxing
C) Decompiling
D) Reverse engineering
سؤال
A risk matrix is a visual color-coded tool that lists the impact and likelihood of risks.
سؤال
For software, a digital representation or _______________ of the original file can be created and then compared against a later version of the file; if the two versions match, the code has not changed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Exploring Penetration Testing
1
Which of the following biases involves making a decision before investigating and then only looking for data that supports the theory?

A) Present bias
B) Framing effect
C) Confirmation bias
D) Availability bias
Confirmation bias
2
What term describes an expansion of a test beyond the initial set of the test's limitations?
Creep
3
At which level of penetration testing are testers given limited knowledge of the network and some elevated privileges?

A) Gray box
B) White box
C) Black box
D) Yellow box
Gray box
4
______________ bias tends to discount future risks and gains in favor of immediate gratification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not considered an advantage of contracting with an external third party to conduct a penetration test?

A) Expertise
B) Focus
C) Experience
D) Cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the process of turning binary machine language back into source code?

A) Reverse engineering
B) Disassembling
C) Decomposition
D) Decompensation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
What term describes a network of vendors, manufacturers, and distributors that move a product from the supplier to the customer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is the isolation of malware from interaction with a computer's operating system, hardware, and files?

A) Disassembling
B) Sandboxing
C) Decompiling
D) Reverse engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
A risk matrix is a visual color-coded tool that lists the impact and likelihood of risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
For software, a digital representation or _______________ of the original file can be created and then compared against a later version of the file; if the two versions match, the code has not changed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.