OA Exams

  • web.groovymark@gmail.com
  • December 5, 2024

Question 21

Explain the “unknown environment” test strategy:

a) Testing is performed with partial knowledge of the system
b) The PenTesting team has complete access to system details
c) The PenTesting team has no prior knowledge about the system
d) Only internal staff perform the tests

Correct Answer: The PenTesting team has no prior knowledge about the system

Explanation: In an unknown environment test, the PenTesting team mimics the behavior of a real threat actor with no prior access to system information.

Question 22

Explain the “partially known environment” strategy:

a) The PenTesting team has no knowledge of the system at all
b) The team is provided partial information, such as internal functionality or code
c) The team only works on external assets
d) The test focuses solely on user access rights

Correct Answer: The team is provided partial information, such as internal functionality or code

Explanation: In a partially known environment test, some system details are provided, allowing the team to focus on specific vulnerabilities and system defects.

Question 23

Explain known environment testing:

a) The PenTesting team is given complete access and information
b) Testing is only conducted on external-facing systems
c) The test is run by users only
d) The PenTesting team has limited information about the environment

Correct Answer: The PenTesting team is given complete access and information

Explanation: In known environment testing, the team is provided with full knowledge about the system, allowing for a comprehensive security assessment.

Question 24

What are some elements to review with stakeholders when determining the scope of the test?

a) IP addresses only
b) Scope, assets, strategy, timeline, and legal restrictions
c) Only in-scope assets and exclusion zones
d) Just the timeline and restrictions

Correct Answer: Scope, assets, strategy, timeline, and legal restrictions

Explanation: It's essential to define the scope, in-scope assets, excluded areas, testing strategy, timeline, and any legal restrictions before the test.

Question 25

What is a Master Service Agreement (MSA)?

a) A legal contract for system audits
b) A contract that defines ongoing services and cost structures
c) A document used for software testing
d) A vulnerability management agreement

Correct Answer: A contract that defines ongoing services and cost structures

Explanation: An MSA outlines the terms for recurring services, cost structures, and additional fees that might arise during a project.

Question 26

What is a Statement of Work (SOW)?

a) A document detailing vulnerability scans
b) A document outlining project deliverables, timelines, and payment terms
c) A report on security patches applied
d) A contract covering penalties for non-compliance

Correct Answer: A document outlining project deliverables, timelines, and payment terms

Explanation: The SOW defines specific expectations for a business arrangement, including deliverables, milestones, and payment schedules.

Question 27

What is a Service-Level Agreement (SLA)?

a) An internal document for managing team roles
b) A contract outlining detailed service terms, including performance metrics
c) A report card for system vulnerabilities
d) A communication protocol for internal audits

Correct Answer: A contract outlining detailed service terms, including performance metrics

Explanation: SLAs define the expected levels of service, performance metrics, and penalties if those levels are not met, including security and risk assessments.

Question 28

Describe the following DNS records: MX, NS, TXT, SRV:

a) Mail Exchange, Name Server, Text, and Service
b) Main Exchange, Net Server, Terminal Server, and Routing Server
c) Mail Transfer, New Server, Terminal Server, and Secure Record
d) None of the above

Correct Answer: Mail Exchange, Name Server, Text, and Service

Explanation: These DNS records help direct different kinds of network traffic. MX points to mail servers, NS identifies authoritative servers, TXT contains text information, and SRV provides service information like VoIP or IM services.

Question 29

Describe nslookup and Dig:

a) Tools to analyze malware signatures
b) Tools for querying DNS records and domains
c) Tools for testing firewall configurations
d) Vulnerability scanning tools for DNS servers

Correct Answer: Tools for querying DNS records and domains

Explanation: Nslookup and Dig are tools that help in querying DNS servers to obtain domain information such as IP addresses, MX records, and more.

Question 30

 Explain the highlights of the following source code repositories: GitHub, Bitbucket, CloudForge, SourceForge:

a) These are cloud-based platforms for storing emails
b) These repositories store application source code and offer collaboration tools
c) They are tools for compiling software
d) They are anti-malware platforms

Correct Answer: These repositories store application source code and offer collaboration tools

Explanation: GitHub, Bitbucket, CloudForge, and SourceForge are cloud-based repositories that provide features like version control, bug tracking, and project collaboration.

Question 31

What are some sites that offer reverse image search?

a) Shodan, Tenable, Metasploit
b) Google, TinEye, Yandex
c) Nessus, Retina, CloudForge
d) Amazon, Bing, CVE

Correct Answer: Google, TinEye, Yandex

Explanation: Google, TinEye, and Yandex offer reverse image search services, which allow users to upload an image to find related images or websites.

Question 32

What are 5 tools to investigate a website?

a) Firefox, Chrome, Safari, Internet Explorer, and Opera
b) Nmap, Metasploit, DirBuster, forced browsing, and web spiders
c) Word, Excel, PowerPoint, Outlook, and OneNote
d) Facebook, Twitter, LinkedIn, Instagram, and TikTok

Correct Answer: Nmap, Metasploit, DirBuster, forced browsing, and web spiders

Explanation: These tools are used for web investigation, including port scanning, exploiting vulnerabilities, and identifying unlinked URLs.

Question 33

 What is a robots.txt file?

a) A file that enhances web application security
b) A file that tells search engine bots where they are allowed to crawl
c) A file used to store network configuration data
d) A malware scanning configuration file

Correct Answer: A file that tells search engine bots where they are allowed to crawl

Explanation: A robots.txt file is found in the root directory of a website and specifies which parts of the site search engines are allowed or disallowed from indexing.

Question 34

What is the importance of a digital certificate’s SAN?

a) It secures the content in email transmissions
b) It identifies specific subdomains covered by the certificate
c) It encrypts VPN communication
d) It helps manage encryption keys

Correct Answer: It identifies specific subdomains covered by the certificate

Explanation: The Subject Alternative Name (SAN) field in a digital certificate allows for the inclusion of multiple subdomains or hostnames under one certificate.

Question 35

 What are a certificate’s CT logs?

a) Logs of changes to server configurations
b) Logs of digital certificate authorities, which are publicly accessible
c) Logs of successful network penetration tests
d) Logs tracking software updates

Correct Answer: Logs of digital certificate authorities, which are publicly accessible

Explanation: Certificate Transparency (CT) logs contain public records of certificates issued by Certificate Authorities (CAs), helping to detect rogue or misissued certificates.

Question 36

 What is the significance of CRL and OCSP regarding certificates?

a) They identify software bugs in encryption algorithms
b) They check the status of certificates to determine validity
c) They enhance encryption strength for data in transit
d) They provide a backup for lost encryption keys

Correct Answer: They check the status of certificates to determine validity

Explanation: The Certificate Revocation List (CRL) and the Online Certificate Status Protocol (OCSP) are methods for checking whether a certificate has been revoked.

Question 37

Explain the 2 ways a certificate is checked for validity:

a) By verifying against CRL or checking with OCSP
b) By decoding the certificate’s public key
c) By analyzing the certificate’s expiry date
d) By comparing it to a firewall rule set

Correct Answer: By verifying against CRL or checking with OCSP

Explanation: Certificates are validated by checking their status with either the CRL or OCSP to see if they have been revoked or are still valid.

Question 38

 What is Metagoofil?

a) A web application firewall
b) A Python-based tool for extracting metadata from public documents
c) A file encryption software
d) A tool for DNS enumeration

Correct Answer: A Python-based tool for extracting metadata from public documents

Explanation: Metagoofil is a Linux-based tool that searches Google for public documents and extracts metadata such as usernames and software versions.

Question 39

What is FOCA?

a) A Linux-based vulnerability scanning tool
b) A Windows OSINT tool for discovering metadata in documents
c) A tool for password cracking
d) A network scanning tool

Correct Answer: A Windows OSINT tool for discovering metadata in documents

Explanation: FOCA (Fingerprinting Organizations with Collected Archives) is an open-source intelligence tool that extracts metadata from documents found online.

Question 40

Explain OSINT tool TheHarvester (CLI):

a) A command-line tool to extract metadata from files
b) A tool for automated gathering of open-source intelligence like subdomains and email addresses
c) A command-line interface for creating phishing campaigns
d) A tool for encrypting sensitive data

Correct Answer: A tool for automated gathering of open-source intelligence like subdomains and email addresses

Explanation: TheHarvester automates the collection of OSINT, including subdomains, email addresses, and PGP key entries, from various public sources.

Complete the Captcha to view next question set.

Prev Post
WGU D196 Practice Exam Questions – Set 1 – Part 1
Next Post
WGU D332 Practice Exam Questions – Set 1 – Part 3