Review Questions
Now it's time to check your knowledge. Answer the questions, and then check your answers, which can be found in the Assessments section at the end of the book:
- Which pen tester would be given source code?
- Why would a shared account pose a problem to monitoring?
- Which pen tester would be given no access prior to the test but, at the last minute, is given a diagram of the desktops?
- What needs to be established prior to a pen test commencing?
- While carrying out an unannounced pen test, how does the tester know if the internal security team are on to him?
- What is the scope of rules of engagement?
- If the pen test has been announced to the IT team, what information should they give regarding the test prior to the test starting?
- What is the main difference between a credentialed and a non-credentialed vulnerability scan?
- At what phase of a pen test does the tester return the systems back to the original state or inform the IT...