CREST CPSA EXAM 300 QUESTIONS AND CORRECT ANSWERS LATEST 2023-2024(VERIFIED ANSWERS)
CREST CPSA EXAM 300 QUESTIONS AND
CORRECT ANSWERS LATEST 2023-
2024(VERIFIED ANSWERS)
What port does squid proxy use? - ANSWER- 3128
What are the benefits of a penetration test? - ANSWER- - Enhancement of the
management system
- Avoid fines
- Protection from financial damage
- Customer protection
What is the structure of a penetration test? - ANSWER- Planning and Preparation
Reconnaissance
Discovery
Analyzing information and risks
Active intrusion attempts
Final analysis
Report Preparation
What is another structure of a penetration test? - ANSWER- Reconnaissance
Vulnerability Scanning
Investigation
Exploitation
What is does infrastructure testing include? - ANSWER- Includes all internal
computer systems, associated external devices, internet networking, cloud and
virtualization testing.
What are the types of infrastructure testing? - ANSWER- - External Infrastructure
Penetration Testing
- Internal Infrastructure Penetration Testing
- Cloud and Virtualization Penetration Testing
- Wireless Security Penetration Testing
What does External Infrastructure Testing include? - ANSWER- Mapping flaws in
the external infrastructure
What are the benefits of External Infrastructure Testing ? - ANSWER- - Identifies
flaws within the firewall configuration that could be misused.
- Finds how information could be leaked out from the system
- Suggests how these issues could be fixed
- Prepares a comprehensive report highlighting the security risk of the networks
and suggests solutions
- Ensures overall efficiency and productivity of your business
What are the benefits of Internal Infrastructure testing? - ANSWER- -Identifies
how an internal attacker could take advantage of even a minor security flaw
- Identifies the potential business risk and damage that an internal attacker can
inflict
- Improves security systems of internal infrastructure
- Prepares a comprehensive report giving details of the security exposures of
internal networks along with the detailed action plan on how to deal with it
What are the benefits of cloud and virtualization penetration testing? - ANSWER-
- Discover the real risks within the virtual environment and suggests the methods
and costs to fix the threats and flaws
- Provides guidelines and an action plan how to resolve the issues
- Improves the overall protection systems
- Prepares a comprehensive security system report of the cloud computing and
virtualization, outline the security flaws, causes and possible solutions
What are the benefits of wireless security penetration testing ? - ANSWER- - To
find the potential risk caused by your wireless device
- To provide guidelines and an action plan on how to protect from the external
threats
- For preparing a comprehensive security system report of the wireless networking,
to outline the security flaw, causes, and possible solutions
What is Black Box Testing? - ANSWER- Black-box testing is a method in which
the tester is provided no information about the application being tested.
What are the advantages of Black Box Testing? - ANSWER- - Test is generally
conducted with the perspective of a user, not the designer
- Verifies contradictions in the actual system and the specifications
What are the disadvantages of black box penetration testing? - ANSWER- -
Particularly, these kinds of test cases are difficult to design
- Possibly, it is not worth, in-case designer has already conducted a test case
- It does not conduct everything
What is white box penetration testing ? - ANSWER- A tester is provided a whole
range of information about the systems and/or network such as schema, source
code, os details, ip address, etc.
What are the advantages of white box penetration testing? - ANSWER- - It ensures
that all independent paths of a module have been exercised
- It ensures that all logical decisions have been verified along with their true and
false value.
- It discovers the typographical errors and does syntax checking
- It finds the design errors that may have occurred because of the difference
between logical flow of the program and the actual execution.
What are the important highlights of the computer misuse act 1990? - ANSWERSection 1: Unauthorized access to computer material
Section 2: Unauthorized access with intent to commit or facilitate commission of
further offenses
Section 3: Unauthorized acts with intent to impair, or with recklessness as to
impairing the operation of a computer
Unauthorized modification of computer material
What are the important highlights of the human rights act 1998? - ANSWER- -
The right to life
- The right to respect for private and family life
- The right to freedom of religion and belief
- Your right not to be mistreated or wrongly punished by the state
when capturing the scope of a penetration test, what information requires consent
to meet the UK laws? - ANSWER- -Name & Position of the individual who is
providing consent
-Authorized testing period - both the date range and hours that testing is permitted
- Contact information for members of technical staff, who may provide assistance
during the test
- IP addresses or URL that are in scope of testing
- Exclusions to certain hosts, services or areas within application testing
Credentials that may be required as part of authenticated application testing
What are the important highlights of the data protection act 1998? - ANSWER- -
Personal data must be processed fairly and lawfully
- be obtained only for lawful purposes and not processed in any manner
incompatible with those purposes
- be adequate, relevant and not excessive
- be accurate and current
- not be retained for longer than neccessary
- be processed in accordance with the rights and freedoms of data subjects
- Be protected against unauthorized or unlawful processing and against accidental
loss, destruction or damage
What are the important highlights of the police and justice act 2006? - ANSWER- -
Make amendments to the computer misuse act 1990
- increased penalties of computer misuse act (makes unauthorized computer access
serious enough to fall under extradition)
- Made it illegal to perform DOS attacks
- Made it illegal to supply and own hacking tools.
- Be careful about how you release information about exploits.
What issues may arise between a tester and his client? - ANSWER- - The tester is
unknown to his client - so, on what grounds, he should be given access of sensitive
data
-Who will take the guarantee of security of lost data?
- The client may blame for the loss of data or confidentiality to tester.
How can you prevent legal issues when doing a penetration test? - ANSWER- A
statement of intent should be duly signed by both parties
- The tester has the permission in writing, with clearly defined parameters
- the company has the details of its pen tester and an assurance that he would not
leak any confidential data
What does scoping a penetration test involve? - ANSWER- - All relevant risk
owners
- Technical staff knowledgeable about the target system
- A representative of the penetration test team
- Risk owners should outline any areas of special concern
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |