Module 1 – Penetration Testing
Planning and Discovery Knowledge Check
1. What type of scan can be conducted to determine what possible exploits
exist given the client’s environment?
- Port Scan
- Document Scanning
- Anti-Virus Scan
- Vulnerability Scan ✔
- Packet Sniffing
- Shoulder Surfing ✔
- Dumpster Diving ✔
- Social Engineering ✔
- Offline
- Active ✔
- Passive
- Neutral
- True
- False ✔
Attack and Reporting Knowledge Check
1. What level of access is ideal for a penetration tester to achieve in order
to exploit a system?
- Standard
- Admin/Root ✔
- Guest
- Advanced
- Misconfigurations
- Race Conditions
- Incorrect File and Directory Permissions
- Phishing ✔
- Executive Summary
- Rules of Engagement
- Recommendations for Remediation
- Technical Review ✔
Penetration Testing Tools
1. Which tool lets you log network traffic and analyze it?
- Nmap
- John the Ripper
- Metasploit
- Wireshark ✔
- Wireshark
- Hack the Box
- John the Ripper
- Kali Linux ✔
- Kali Linux
- Nmap
- John the Ripper ✔
- Metasploit
Penetration Test Graded Quiz
1. Which of the following is NOT a phase of a penetration test?
- Discovery
- Attack ✔
- Reviewing
- Planning
- Planning
- Discovery
- Attack
- Reporting ✔
- Executive Summary ✔
- Scope Worksheet
- Technical Report
- Risk Analysis
- Reporting
- Discovery ✔
- Exploitation
- Planning
- Phishing
- Social Engineering
- Port Scanning ✔
- Google Dorking
- Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
- General Data Protection Regulation (GDPR) ✔
- Health Insurance Portability and Accountability Act (HIPPA) ✔
- Distributed Denial of Service (DDoS)
- Brute Force ✔
- Hash
- Passive Agressive
- Persistent
- Rules of Engagement (RoE)
- Scope Worksheet
- Non Disclosure Agreement (NDA) ✔
- Press Release
- Planning and Discovery
- Discovery and Reporting
- Discovery and Attack ✔
- Planning and Attack
- Grey Box
- Red Hat
- White Box
- Black Box ✔
Module 2 – Incident Response
Incident Response Knowledge Check
1. Which three (3) of the following are phases of an incident response?
1. Select the missing phase of Incident Response: Preparation, _____,
Containment, Eradication & Recovery, Post Incident Activity.
- Containment, Eradication & Recovery ✔
- Post Incident Analysis & Lessons Learned
- Preparation ✔
- Detection & Analysis ✔
- An incident is defined as an event that takes place at a specific time and place.
- An incident can lead to an event if it is determined to be a threat.
- Multiple events of the same type are necessary before they can be considered an incident.
- An event may be totally benign, like receiving an email. ✔
- True
- False ✔
- Distributed ✔
- Coordinating ✔
- Central ✔
- Control
- An unauthorized removable drive being attached to the network. ✔
- A brute force hacking attack. ✔
- A former employee using his knowledge at a competitor company.
- An email phishing attack. ✔
- IR Policy testing responsibility. ✔
- IR Awareness training.
- Means, tools and resources available. ✔
- Identity of IR team members. ✔
- Incident Handler Communications and Facilities. ✔
- Incident Analysis Resources.
- Incident Post-Analysis Resources.
- Incident Analysis Hardware and Software.
- Detecting the use of a vulnerability scanner ✔
- An announced threat against your organization from an activist group. ✔
- An application log showing numerous failed login attempts from an unknown remote system.
- A vendor notice of a vulnerability to a product you own. ✔
- IPS
- IDS ✔
- DLP
- SIEM
- True
- False ✔
- None
- Privacy Breach ✔
- Proprietary Breach
- Integrity Loss
- Regular
- Extended
- Supplemented ✔
- Not Recoverable
- Containment ✔
- Eradication
- Recovery
- None of these
- Utilizing collected data
- Evidence retension
- Lessons learned meeting ✔
- Documentation review & update
Incident Response Graded Quiz
- Detection and Analysis ✔
- Execution
- Root Cause Analysis
- Acquire Data
- An incident is an event that negatively affects IT systems. ✔
- An incident is any collection of 3 or more related events.
- Incidents involved external actors while events involved internal actors.
- An incident becomes an event if a threat is identified.
- True ✔
- False
- Distributed
- Coordinating
- Central ✔
- Control
- Trap the bad actors.
- Interrogate suspects.
- Coordinate with other teams and the media. ✔
- Avoid events turning into Incidents.
- Incident Analysis Resources ✔
- Incident Handler Communications and Facilities ✔
- Incident Post-Analysis Resources
- Incident Analysis Hardware and Software ✔
- Incident Post-Analysis Resources
- Incident Analysis Resources ✔
- Incident Analysis Hardware and Software
- Incident Handler Communications and Facilities
- Detecting the use of a vulnerability scanner.
- An application log showing numerous failed login attempts from an unknown remote system. ✔
- A significant deviation from typical network traffic flow patterns. ✔
- The discovery of a file containing unusual characters by a system administrator. ✔
- IPS
- IDS
- DLP
- SIEM ✔
- True ✔
- False
- Proprietary Breach
- Privacy Breach
- Integrity Loss ✔
- None
- Not Recoverable ✔
- Supplemented
- Regular
- Extended
- Containment
- Eradication ✔
- Recovery
- None of these.
- Lessons learned meeting
- Evidence retention
- Documentation review & update
- Utilizing collected data ✔
Module 3 – Digital Forensics
Forensic Course Overview Knowledge Check
1. Digital forensics can be defined as the application of science to the
identification, collection, examination, and analysis of what?
- Malware
- Data ✔
- Evidence
- Cybercriminals
- Examination ✔
- Preserving
- Reporting ✔
- Investigating
- Analysis ✔
- Collection ✔
The Forensics Process Knowledge Check
1. According to NIST, a forensic analysis should include four elements,
Places, Items, Events and what?
- People ✔
- Methods
- Data
- Systems
- True ✔
- False
- Overview & Case Summary
- Forensic Acquisition & Examination Preparation ✔
- Findings & Analysis
- Conclusion
- Data ✔
- Malware
- Forensic dead-ends
- Leaks
- Dealing with a sea of data. A single hard drive will contains many thousands of files that are not relevant to our investigation. ✔
- Selecting the most effective tools to help with the searching and filtering of data. ✔
- Bypassing controls such as operating system and encryption passwords. ✔
- Not tripping malware booby traps that were setup to prevent examination of data.
Forensic Data Knowledge Check
1. True or False. Only data files can be effectively analyzed during a
forensic analysis.
- True
- False ✔
- Block buffer space
- Slack space ✔
- Free space
- Allocation overage space
- Machine Access Control
- Metadata associated with i/OS files
- Machine Allocated Content
- Modification, Access and Creation times ✔
- Non-volatile
- Dynamic
- Volatile ✔
- Static
- True ✔
- False
- Mac OS X ✔
- Microsoft Window
- Linux
- UNIX
- Supporting files ✔
- Operating system DLLs
- Log files ✔
- Configuration settings ✔
- Email ✔
- OSI Application Layer protocols
- Patch files
- Operating system DLLs
- HTTP addresses ✔
- TCP addresses
- UDP addresses
- ICMP addresses
- Firewall ✔
- Intrusion detection system
- Packet sniffer
- Remote access server
Digital Forensics Assessment
1. Digital forensics is commonly applied to which of the following
activities?
- Criminal investigation
- Incident handling
- Data recovery
- All of the above ✔
- Develop a plan to aquire the data ✔
- Verify the integrity of the data ✔
- Acquire the data
- Normalize the data
- So a person in possession of evidence will know who they are allowed to give it to next
- To keep valuable hardware securely locked to tables or floors.
- To allow for accurate client billing
- To avoid allegations of mishandling or tampering of evidence. ✔
- True ✔
- False
- True
- False ✔
- Overview & Case Summary
- Forensic Acquisition & Examination Preparation
- Findings & Analysis ✔
- Conclusion
- Data files
- Image and video files
- Application files
- All of the above ✔
- The memory registers used by the file are erased and marked as available for new storage.
- The file is copied to a trash or recycle folder and the original memory registers are erased.
- The memory registers used by the file are marked as available for new storage but are otherwise not changed. ✔
- Random data is immediately copied into the memory registers used by the file to obfuscate the previous contents.
- An incremental backup
- A logical backup ✔
- A disk-to-file backup
- A disk-to-disk backup
- They can quickly eliminate known good operating system and application files from consideration. ✔
- They provide a record of known encrypted malware.
- Hashes will help you quickly zero in on deleted files.
- They are useful in identifying files that were created outside the United States.
- Dump files ✔
- Swap files ✔
- Free space
- Logs ✔
- Static
- Volatile
- Dynamic
- Non-volatile ✔
- True
- False ✔
- OSI Application Layer protocols
- Data files ✔
- Authentication mechanisms ✔
- Application architecture ✔Application architecture ✔
- Patch files ✔
- Chat
- Web host data
- UDP
- IPv4 / IPv6 ✔
- LDAP
- ICMP ✔
- Firewall
- Remote access server ✔
- Packet sniffer
- Intrusion detection system
- Intrusion detection systems
- System Event Management systems
- ISP records ✔
- Firewalls
Module 4 – Introduction to Scripting
Scripting Overview Knowledge Check
1. Which organization is credited with creating the first scripting
language?
- Digital Computer Corporation
- NIST
- University of California at Berkley
- IBM Corporation ✔
- Variables
- IF statements
- Arguments
- Loops ✔
- PowerShell ✔
- JCL ✔
- FORTRAN
- JavaScript ✔
- True ✔
- False
- TRAC
- Logical
- Binary ✔
- base2
Python Scripting Knowledge Check
1. Python can be best described as what?
pi=3
What is the data type of the variable pi?
Example2=”B”
Example1 is a character variable type while Example2 is a string variable type.
pi=3
pi3=3*pi
print(pi3)
pi3
- A high-level scripting language. ✔
- A low-level compiled programming language.
- The hottest new scripting language introduced in 2012.
- A structured programming language.
- True ✔
- False
- To indicate a library function is being called.
- To define a block of code and are required. ✔
- For readability and are optional.
- To define loop nesting and are required.
- .txt
- .python
- Any extension is allowed as long as the file only contains ASCII text characters.
- .py ✔
pi=3
What is the data type of the variable pi?
- string
- float
- bool
- int ✔
Example2=”B”
Example1 is a character variable type while Example2 is a string variable type.
- True
- False ✔
pi=3
pi3=3*pi
print(pi3)
pi3
- 333
- 9 ✔
- 3
- True ✔
- False
- As long as the specified condition is true. ✔
- Until the end while statement is encountered.
- As many times as are specified in the loop counter.
- Until the first exit statement is encountered.
- True
- False ✔
- NumPy ✔
- StatsModels
- Matplotlib
- Pandas ✔
- Seaborn
- Scikit-learn
Introduction to Scripting Assessment
1. What was considered to be the first scripting language?
pi=3.14159
pi=int(pi)
print(pi)
Example1=”3″
Example1 is a string variable type.
pi3=3*pi
print(pi3)
for country in UNMembers:
print(country)
- Perl
- Bash
- TRAC
- JCL ✔
- Arguments
- IF statements
- Loops
- Variables ✔
- Bash ✔
- Perl ✔
- C++
- Hex ✔
- JCL
- JavaScript
- Perl
- PowerShell ✔
- Autocorrection
- Word processing
- Task automation ✔
- Transcription
- Arguments
- If-then
- Loops ✔
- Variables
- Linux
- UNIX ✔
- Mac OS X
- Windows
- print(Hello World)
- print(“Hello World”) ✔
- type(“Hello World”)
- output(0,”Hello World”)
- Python can utilize extensive function libraries. ✔
- In Python you can embed multiple steps within a single command.
- Python generally takes more lines of code than C or Java to accomplish the same task.
- Python code is more efficient than C or Java code.
- Any number 1 or more as long as the same indentation is used within a code block. ✔
- Multiples of 3.
- Any number 1 or more as long as the same indentation is used throughout the program.
- Indentation is binary, i.e. a line is either indented or it is not, so there is no restriction to how many spaces are used on any line of indented code.
- Treat everything to the right of the hash on the current line as a comment. ✔
- Treat everything between that hash and the next hash encountered in the program as a comment.
- Hash is used as a wildcard character in Python.
- Call in the referenced library function the follows the hash.
pi=3.14159
pi=int(pi)
print(pi)
- 3 ✔
- 3.14159
- pi=3.14159
- pi
Example1=”3″
Example1 is a string variable type.
- True ✔
- False
pi3=3*pi
print(pi3)
- 333 ✔
- 9
- 3
- pi3
for country in UNMembers:
print(country)
- 0
- 1
- 193 ✔
- Until it reaches a specified country
- There is no library function already written that will do what you need. ✔
- Python only operates through the execution of functions.
- Functions execute far faster than standard Python code.
- There are extra Python operators that will only execute inside of a defined function.
- Pandas
- Seaborn ✔
- Scikit-learn
- StatsModels
- NumPy
- Matplotlib ✔