Basic Penetration Testing
Fill in the blanks
Types of Penetration
Penetration Testing Process
100

A Permitted sim attack on your computer system to test its security. 

What is Penetration Testing?

100

Individuals attempt to ____________ or system using the same tools an attacker would use

What is break into a network?

100

Bonus!

Bonus!

100

The 4 steps of Penetration Testing. 

What is Planning, Information gathering, Execution and Reporting?

200

What is the subject you're taking in this class?

What is cybersecurity/cyberdefense?

200

The appropriate __________ need to be taken to harden the system.

What is security measures?

200

The penetration tester has no information regarding the target or network. 

What is Black box?

200

Afterr any penetration test, a detailed report must be compiled.

What is reporting?

300

Protects your web apps by filtering, monitoring, and blocking any malicious http/s.

What is web application firewall?

300

Penetration testing is the practice of finding _____________ and __________ with the purpose of securing the computer or network system.

What is vulnerabilities and risks ?

300

Name of your cybersecurity/cyberdefense teacher.

Who is Ms. Adato?

300

What are the 3 documentation you need in penetration testing?

What is timing, scope, and authorization?

400

Short term for "Penetration Testing"

What is Pen Test?

400

A penetration test helps to ensure a fresh look at potential ____________ .

What is weaknesses?

400

The penetration tester is given partial information about the target or network, such as IP configurations or emails lists.

What is Gray Box?

400

What are the 4 parts of execution?

What are access, privilege escalation, system exploration, installation and use of pen testing tools?

500

It can help ensure that the controls are working effectively and are continually updated.

What is Regular penetration testing? 

500

To be most effective, pen tests are run by a ________________ or someone who is not involved in the security implementation processes.

What is Security Analyst?

500

The penetration tester is given full knowledge of the target or network.

What is White Box?

500

The penetration testers start to collect information about the networks and systems that they are testing.

What is information gathering?

M
e
n
u