Planning and Scoping
Information Gathering and Vulnerability Scanning
Attacks and Exploits
Reporting and Communication
Tools and Code Analysis
100

Before starting a penetration test, you must obtain this formal agreement outlining the rules of engagement.

Statement of Work (SOW)

100

This passive reconnaissance method involves searching for company information on social media and public websites.

Open-Source Intelligence (OSINT)

100

This attack floods a network with traffic, making resources unavailable to legitimate users.

Denial-of-Service (DoS)

100

This report is presented to stakeholders after a penetration test, summarizing findings and remediation steps.

Penetration Testing Report

100

This Linux-based penetration testing distribution comes preloaded with ethical hacking tools.

Kali Linux

200

This type of penetration test restricts the tester from knowing internal details about the target, simulating a real-world external attack.

Black Box Test

200

What is the primary tool used for vulnerability scanning in penetration testing?

Nessus

200

Attackers use this type of code injection to steal session cookies from a user’s browser.

Cross-Site Scripting (XSS)

200

A penetration tester must classify vulnerabilities using this industry-standard scoring system.

Common Vulnerability Scoring System (CVSS)

200

This tool is commonly used for packet analysis and network traffic monitoring.

Wireshark

300

This legal document ensures that penetration testers have permission to test systems without facing legal consequences.

Rules of Engagement (RoE)

300

The acronym OWASP stands for what?

Open Web Application Security Project

300

This attack technique exploits memory corruption to execute arbitrary code on a target machine.

Buffer Overflow

300

This report section explains how a vulnerability was discovered, what impact it has, and how it can be remediated.

Post-Exploitation

300

A penetration tester can automate reconnaissance using this Python-based tool to scrape open-source data.

theHarvester

400

During scoping, penetration testers consider the RTO and RPO. What do these abbreviations stand for?

Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

400

This type of scan identifies live hosts and open ports on a network before an exploit attempt.

Network Enumeration Scan

400

Attackers use this method to escalate privileges by exploiting weak system configurations or kernel vulnerabilities.

Privilege Escalation

400

This report section explains how a vulnerability was discovered, what impact it has, and how it can be remediated.

Executive Summary

400

This scripting language is frequently used in penetration testing to automate tasks and create exploits.

Python

500

When planning an engagement, testers assess risk, cost, and potential impact. This process is called what?

Business Impact Analysis (BIA)

500

This technique manipulates DNS queries to gather intelligence on a target’s infrastructure.

DNS Zone Transfer

500

This advanced post-exploitation attack allows an attacker to execute system commands remotely without direct user interaction.

Pass-the-Hash

500

This framework standardizes the way cybersecurity professionals share information about threats and vulnerabilities.

MITRE ATT&CK framework

500

Reverse engineering malware often involves analyzing this type of code, which represents machine instructions.

Assembly Language