
SS7e-02
Quiz by Gibbons, Carl
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake?DocumentationBudgetingApprovalPlanning30s
- Q2Which of the following is NOT a characteristic of a penetration test?AutomatedPerformed occasionallyFinds deep vulnerabilitiesMay use internal employees or external consultants30s
- Q3Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?Blue TeamPurple TeamWhite TeamRed Team30s
- Q4Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo?They would have to stay overnight to perform the test.Employees may have a reluctance to reveal a vulnerability.There may be a lack of expertise.The employees could not have inside knowledge of the network that would give them an advantage.30s
- Q5What penetration testing level name is given to testers who have no knowledge of the network and no special privileges?White boxBlack boxPurple boxGray box30s
- Q6Which of the following is NOT an advantage of crowdsourced penetration testing?Less expensiveConducting multiple tests simultaneouslyFaster testingAbility to rotate teams30s
- Q7Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation?ExploitationTargetsScopeLimitations and exclusion30s
- Q8Which is the final rule of engagement that would be conducted in a pen test?CommunicationReportingCleanupExploitation30s
- Q9What is another name for footprinting?RevealingHigh-level reconnaissanceActive reconnaissanceModeling30s
- Q10When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique?Squaring upJumpingTwirlingLateral movement30s
- Q11What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?Blue papersRequests for comments (RFCs)White notebooksCybersecurity feeds30s
- Q12Which of the following is NOT a general information source that can provide valuable in-depth information on cybersecurity?TwitterVendor websitesLocal industry groupsConferences30s
- Q13Which of the following is a standard for the handling of customer card information?OSS XRSRMR CDCPCI DSSDRD STR30s
- Q14Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals?LegislationBenchmarksRegulationsWhite papers30s
- Q15Which group is responsible for the Cloud Controls Matrix?OSINTCISCSANIST30s