OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 5, 2024

Question 01

How do you calculate Risk?

a) Risk = Threat + Vulnerability
b) Risk = Threat x Vulnerability
c) Risk = Threat – Vulnerability
d) Risk = Vulnerability / Threat

Correct Answer: Risk = Threat x Vulnerability

Explanation: Risk is calculated as the product of the threat and the vulnerability, indicating the potential impact of a vulnerability being exploited

Question 02

 Describe unified threat management (UTM):

a) A standalone firewall for network security
b) A collection of individual security appliances
c) An all-in-one security appliance combining multiple security functions
d) A malware scanner only

Correct Answer: An all-in-one security appliance combining multiple security functions

Explanation: UTM appliances combine functions like firewall, malware scanning, intrusion detection, and more, offering a comprehensive security solution.

Question 03

Describe OWASP:

a) A web browser testing tool
b) An open-source security project focused on web applications
c) A vulnerability scanning tool for web applications
d) A security operations center for web servers

Correct Answer: An open-source security project focused on web applications

Explanation: OWASP is a project that publishes a top-ten list of vulnerabilities and provides frameworks for testing web applications during development.

Question 04

Describe NIST:

a) A private security organization
b) A standards body for global cybersecurity
c) A U.S. agency developing security standards for federal agencies
d) A European organization for cybersecurity

Correct Answer: A U.S. agency developing security standards for federal agencies

Explanation: NIST is the U.S. National Institute of Standards and Technology, which develops security standards used in federal agencies and shares cybersecurity best practices.

Question 05

What is NIST SP 800-115?

a) A guide for software development
b) A penetration testing standard
c) A firewall configuration manual
d) A technical guide to information security testing and assessment

Correct Answer: A technical guide to information security testing and assessment

Explanation: NIST SP 800-115 provides guidance on conducting information security assessments, including penetration testing.

Question 06

Describe OSSTMM:

a) A manual for ethical hacking
b) A framework for developing software
c) A comprehensive methodology for security testing
d) A tool for managing security vulnerabilities

Correct Answer: A comprehensive methodology for security testing

Explanation: OSSTMM (Open-source Security Testing Methodology Manual) outlines all areas requiring testing in an organization, including human and physical security.

Question 07

Describe ISSAF:

a) An automated penetration testing tool
b) A vulnerability scanner
c) A framework for security assessment
d) A set of commercial cybersecurity products

Correct Answer: A framework for security assessment

Explanation: ISSAF (Information Systems Security Assessment Framework) provides a structured approach to security assessments, including contract templates and reporting guidelines.

Question 08

Describe PTES:

a) A tool for automating security testing
b) A set of guidelines for structured penetration testing
c) A vulnerability assessment tool
d) A certification program for ethical hackers

Correct Answer: A set of guidelines for structured penetration testing

Explanation: PTES (Penetration Testing Execution Standard) outlines a methodology for conducting penetration tests, covering stages like pre-engagement and vulnerability analysis.

Question 09

 Explain MITRE ATT&CK:

a) A tool for vulnerability scanning
b) A knowledge base of adversary tactics and techniques
c) A training course for ethical hackers
d) A government agency for cybersecurity research

Correct Answer: A knowledge base of adversary tactics and techniques

Explanation: MITRE ATT&CK is a framework that documents adversary tactics, techniques, and procedures (TTPs), helping organizations understand potential attack vectors.

Question 10

Explain CVSS:

a) A tool for testing firewalls
b) A risk management framework
c) A scoring system for vulnerabilities
d) A standard for assessing network performance

Correct Answer: A scoring system for vulnerabilities

Explanation: CVSS (Common Vulnerability Scoring System) is used to quantify the severity of vulnerabilities, aiding in prioritizing remediation efforts.

Question 11

Explain CVE:

a) A vulnerability testing tool
b) A list of known vulnerabilities
c) A framework for developing secure software
d) A threat detection algorithm

Correct Answer: A list of known vulnerabilities

Explanation: CVE (Common Vulnerabilities and Exposures) provides a standardized format for naming and documenting specific vulnerabilities in software and hardware

Question 12

Explain CWE:

a) A list of coding guidelines
b) A database of software weaknesses
c) A tool for detecting malware
d) A compliance certification

Correct Answer: A database of software weaknesses

Explanation: CWE (Common Weakness Enumeration) is a database maintained by MITRE that lists hardware and software weaknesses, helping developers improve security.

Question 13

What are important considerations when pen-testing a company’s web applications and services?

a) Test only high-risk areas
b) Perform testing with limited permissions
c) Obtain a variety of user roles and permissions for testing
d) Perform all tests externally

Correct Answer: Obtain a variety of user roles and permissions for testing

Explanation: Testing should cover multiple roles, such as user and admin, to ensure all levels of access are secure.

Question 14

What are examples of assets when determining the scope of the test?

a) Software licenses and hardware specs
b) IP addresses, domains, APIs, and SSIDs
c) Third-party vendor agreements
d) User manuals and product documentation

Correct Answer: IP addresses, domains, APIs, and SSIDs

Explanation: Assets include technical elements like IPs, domains, and APIs that must be included in the scope of a penetration test.

Question 15

 Explain internal vs external assets:

a) Internal assets are less valuable than external ones
b) External assets are easier to exploit than internal ones
c) Internal assets are accessed within the network, external assets are internet-visible
d) Internal assets are hosted in the cloud, external assets are on-premise

Correct Answer: Internal assets are accessed within the network, external assets are internet-visible

Explanation: Internal assets are typically accessed by employees, while external assets (e.g., websites, DNS) are exposed to the internet and vulnerable to external threats.

Question 16

Explain first-party vs third-party hosted assets:

a) First-party assets are hosted on internal servers only
b) First-party assets are hosted by the client organization, third-party assets by vendors
c) Third-party hosted assets are always more secure
d) Third-party hosted assets are inaccessible to penetration testers

Correct Answer: First-party assets are hosted by the client organization, third-party assets by vendors

Explanation: First-party hosted assets are under the direct control of the client, while third-party hosted assets are managed by external vendors or partners.

Question 17

What kinds of questions should the PenTest team ask the stakeholders?

a) Open-ended questions to clarify scope and methods
b) Closed questions to reduce testing time
c) Questions focused only on technical issues
d) No questions should be asked

Correct Answer: Open-ended questions to clarify scope and methods

Explanation: Open-ended questions help remove ambiguity, ensuring both the PenTest team and stakeholders are aligned on the methods and goals.

Question 18

Describe compliance-based assessments:

a) Fulfilling legal and regulatory requirements
b) Focusing on detecting malware
c) Testing network performance
d) Evaluating user satisfaction

Correct Answer: Fulfilling legal and regulatory requirements

Explanation: Compliance-based assessments focus on meeting specific laws or standards, such as GDPR or PCI DSS, to ensure the organization complies with regulations.

Question 19

Describe red team/blue team-based assessments:

a) Blue team performs ethical hacking while red team secures the network
b) Red team represents attackers, blue team represents defenders
c) Blue team audits system logs, red team patches vulnerabilities
d) Both teams work together to build firewalls

Correct Answer: Red team represents attackers, blue team represents defenders

Explanation: In red team/blue team assessments, the red team simulates attacks while the blue team focuses on defending the network.

Question 20

Describe goals-based/objectives-based assessments:

a) Assessments focusing on the overall health of the network
b) Testing designed to achieve specific business objectives
c) Randomized testing for system vulnerabilities
d) Testing conducted without a predefined scope

Correct Answer: Testing designed to achieve specific business objectives

Explanation: Goals-based assessments are purpose-driven, targeting specific business objectives, like testing security before launching a new system.

Complete the Captcha to view next question set.

Prev Post
WGU D330 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D196 Practice Exam Questions – Set 1 – Part 1