Chapter 6 ■ Security Assessment and Testing (Domain 6) 133
- What technology should an organization use for each of the devices shown in the diagram
to ensure that logs can be time sequenced across the entire infrastructure?
A. Syslog
B. NTP
C. Logsync
D. SNAP - During a penetration test, Danielle needs to identify systems, but she hasn’t gained suf-
ficient access on the system she is using to generate raw packets. What type of scan should
she run to verify the most open services?
A. A TCP connect scan
B. A TCP SYN scan
C. A UDP scan
D. An ICMP scan - During a port scan using nmap, Joseph discovers that a system shows two ports open that
cause him immediate worry:
21/open
23/open
What services are likely running on those ports?
A. SSH and FTP
B. FTP and Telnet
C. SMTP and Telnet
D. POP3 and SMTP
- Saria’s team is working to persuade their management that their network has extensive
vulnerabilities that attackers could exploit. If she wants to conduct a realistic attack as
part of a penetration test, what type of penetration test should she conduct?
A. Crystal box
B. Gray box
C. White box
D. Black box - What method is commonly used to assess how well software testing covered the potential
uses of an application?
A. A test coverage analysis
B. A source code review
C. A fuzz analysis
D. A code review report