Certified Penetration Testing Professional - CPENT Quiz Questions and Answers

Adam found a pen drive in his company’s parking lot. He connected it to his system to check the content. On the next day, he found that someone has logged into his company email account and sent some emails. What type of social engineering attack has Adam encountered?

Answer :
  • Media Dropping

Explanation :

Media dropping is a simple and straight forward form of social engineering that usually involves a USB thumb drive left somewhere conspicuous

WallSec Inc. has faced several network security issues in the past and hired Williamson, a professional pentester, to audit its information systems. Before starting his work, Williamson, with the help of his legal advisor, signed an agreement with his client. This agreement states that confidential information of the client should not be revealed outside of the engagement. What is the name of the agreement that Williamson and his client signed?

Answer :
  • Non-disclosure agreement

Explanation :

NDA is used for having an legal contract between pentester and client for protecting the company-specific information confidentially

Which of the following acts provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information?

Answer :
  • HIPAA

Explanation :

Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection.

You can add a row using SQL in a database with which of the following?

Answer :
  • INSERT

Explanation :

<p>The INSERT statement is used to add one or more rows to a table</p>

It is safe to use the same session ID before and after login. True or False?

Answer :
  • FALSE

Which of the following would help prevent SQL injection?

Answer :
  • Using a parameterized query

 The SSID is the MAC address of the access point. True or False?

Answer :
  • FALSE

Which of the following is not a subtype of 802.11 network?

Answer :
  • 802.11ay

 Which of the following is a technique for examining Wi-Fi radio transmissions to obtain useful and valuable information?

Answer :
  •  Spectrum analysis