adplus-dvertising
frame-decoration

Question

The company that Ian is performing a penetration test for uses a wired network for their secure systems and does not connect it to their wireless network. What environmental consideration should Ian note if he is conducting a partial knowledge penetration test?

a.

He needs to know the IP ranges in use for the secure network.

b.

He needs to know the SSIDs of any wireless networks.

c.

Physical access to the network may be required.

d.

Physical access to a nearby building may be required.

Answer: (c).Physical access to the network may be required. Explanation:Access to a wired network can require physical access, which could be provided as part of a partial knowledge penetration test. In an unknown environment test, Ian might have to identify a way to compromise a system connected to the network remotely or to gain physical access to the building where the systems are. Knowing the IP ranges or the SSIDs of wireless networks is not required for this type of test. IP ranges can be determined once he is connected, and the test specifically notes that wired networks are not connected.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The company that Ian is performing a penetration test for uses a wired network for their secure systems and does not connect it to their wireless network. What environmental...

Similar Questions

Discover Related MCQs

Q. The penetration testing agreement document that Greg asks his clients to sign includes a statement that the assessment is valid only at the point in time at which it occurs. Why does he include this language?

Q. Lucas has been hired to conduct a penetration test of an organization that processes credit cards. His work will follow the recommendations of the PCI DSS. What type of assessment is Lucas conducting?

Q. During a penetration test specifically scoped to a single web application, Chris discovers that the web server also contains a list of passwords to other servers at the target location. After he notifies the client, they ask him to use them to validate those servers, and he proceeds to test those passwords against the other servers. What has occurred?

Q. Ruchika has been asked to conduct a penetration test against internal business systems at a mid-sized company that operates only during a normal day shift. The test will be run against critical business systems. What restriction is most likely to be appropriate for the testing?

Q. During an on-site penetration test, what scoping element is critical for wireless assessments when working in shared buildings?

Q. What type of penetration test is not aimed at identifying as many vulnerabilities as possible and instead focuses on vulnerabilities that specifically align with the goals of gaining control of specific systems or data?

Q. While performing an on-site penetration test, Cassandra plugs her laptop into an accessible network jack. When she attempts to connect, however, she does not receive an IP address and gets no network connectivity. She knows that the port was working previously. What technology has her target most likely deployed?

Q. What does an MSA typically include?

Q. During a penetration test, Alex discovers that he is unable to scan a server that he was able to successfully scan earlier in the day from the same IP address. What has most likely happened?

Q. During a penetration test scoping discussion, Charles is asked to test the organization’s SaaS-based email system. What concern should he bring up?

Q. What type of legal agreement typically covers sensitive data and information that a penetration tester may encounter while performing an assessment?

Q. Which of the following types of penetration test would provide testers with complete visibility into the configuration of a web server without having to compromise the server to gain that information?

Q. Maria wants to build a penetration testing process for her organization and intends to start with an existing standard or methodology. Which of the following is not suitable for that purpose?

Q. What term describes a document created to define project-specific activities, deliverables, and timelines based on an existing contract?

Q. What may influence how you conduct your assessment and the rules of engagement in compliance-based assessments?

Q. What does compliance with standards like PCI DSS provide in penetration testing?

Q. What understanding helps in better completing compliance assessments?

Q. What drives many penetration tests in terms of compliance?

Q. What ensures coverage in the event of issues during a penetration test?

Q. Why is awareness of the legal and regulatory environment important for penetration testers?