Reference no: EM133352594
Assignment:
1. QSA and Approved Scanning Vendor (ASV) are approved by whom to perform PCI DSS service?
2. State the control requirement number 9 of the 12 PCI standards and its associated control objective
3. Is penetration testing an authorized or unauthorized attempt to hack or exploit computer systems?
4. Name 2 benefits of performing penetration testing
5. What step follows the scanning step in penetration testing, and what is the ultimate goal of this step?
6. What is the most popular tool is used for regular port scanning to determine the list of open/active ports and potential services running on the target system?
7. Name the most popular tool used to determine the vulnerabilities in the services that exist on the open ports and services identified to be running on the target system in penetration testing.
8. What is a botnet in penetration testing?
9. When is denial of service attack typically launched by an attacker against the target system? Is it when the attacker successfully gains access to the system or when he is frustrated and unable to gain access?
10. Name one example of the penetration tools that do or represent the following features
a. collection of hundreds of security tools (i.e., a one-stop shop of hacking tools)
b. executes exploit code or script against a system, including scripts on next course of action after gaining access known as payloads
c. analyzes network protocol and captures the traffic running on a computer network
d. password cracker capable of detecting weak and dictionary passwords