Questions and Answers
What technique does Hashcat use to crack passwords?
Brute force
Which tool is commonly used for network security assessment?
Nmap
What can Nmap help penetration testers identify?
Exploitable vulnerabilities in websites
Which operating systems are supported by Nmap?
Signup and view all the answers
What can penetration testers use Nmap for?
Signup and view all the answers
Which tool is used for automated application vulnerability assessment?
Signup and view all the answers
How does Invicti find vulnerabilities in web assets?
Signup and view all the answers
What is the primary purpose of penetration testing?
Signup and view all the answers
What type of websites can Invicti scan for vulnerabilities?
Signup and view all the answers
Why are pen tests usually performed by outside contractors?
Signup and view all the answers
What term is often used to describe contractors who perform penetration testing?
Signup and view all the answers
Why is it beneficial to have pen tests performed by individuals with little-to-no prior knowledge of the system's security?
Signup and view all the answers
What qualification do many ethical hackers performing pen tests possess?
Signup and view all the answers
Why might some of the best ethical hackers be reformed criminal hackers?
Signup and view all the answers
What is the main difference between an open-box pen test and a closed-box pen test?
Signup and view all the answers
What distinguishes a covert pen test from other types of pen tests?
Signup and view all the answers
During which phase of a pen test does an ethical hacker gather data and information for planning the attack?
Signup and view all the answers
What distinguishes an external pen test from an internal pen test?
Signup and view all the answers
Which technique might an ethical hacker use to gain remote access to a network during a pen test?
Signup and view all the answers
In a closed-box pen test, what information is typically provided to the hacker?
Signup and view all the answers