#1
What is the primary goal of penetration testing?
To identify and fix vulnerabilities in a system
ExplanationEnhances system security by proactively finding and addressing weaknesses.
#2
What is the primary focus of social engineering attacks?
Human psychology and behavior
ExplanationExploiting human tendencies to gain unauthorized access.
#3
In the context of cybersecurity, what does the term 'phishing' refer to?
Tricking individuals into revealing sensitive information
ExplanationDeceptive tactics to obtain confidential information.
#4
What is the purpose of a vulnerability scanner in penetration testing?
To identify and assess security weaknesses
ExplanationAutomated tool for discovering and evaluating vulnerabilities in a system.
#5
What is the role of a Security Operations Center (SOC) in cybersecurity?
To monitor and respond to security incidents
ExplanationCentralized unit for real-time security incident monitoring and response.
#6
Which phase of penetration testing involves gathering information about the target system?
Reconnaissance
ExplanationInitial phase focused on collecting data to better understand the target.
#7
What is the purpose of a firewall in a cybersecurity context?
To block unauthorized access to a network
ExplanationActs as a barrier preventing unauthorized entry into a network.
#8
What is the main purpose of threat modeling in cybersecurity?
To design secure software systems
ExplanationSystematic approach to identifying and mitigating potential security threats during design.
#9
Which of the following is NOT a common penetration testing methodology?
Yellow Box Testing
ExplanationNon-existent testing methodology, not recognized in the field.
#10
Which of the following is an example of a passive reconnaissance technique?
Packet sniffing
ExplanationGathering information without directly interacting with the target system.
#11
Which programming language is commonly used for writing exploits in penetration testing?
Python
ExplanationPopular language for creating effective and versatile penetration testing tools.
#12
What does the term 'zero-day vulnerability' refer to in cybersecurity?
A vulnerability that has never been disclosed publicly
ExplanationSecurity flaw unknown to software developers or the public.
#13
What is the primary objective of a red team in a security assessment?
To simulate and launch real-world attacks
ExplanationMimicking actual adversaries to test and improve security defenses.
#14
What is the purpose of a honey pot in cybersecurity?
To detect and deflect malicious activity
ExplanationFake system designed to attract and identify attackers.
#15
In the context of cybersecurity, what is a 'man-in-the-middle' attack?
An attack where an unauthorized person intercepts and alters communication between two parties
ExplanationUnauthorized interception and manipulation of communication.