is3220lab5

1
Damon Baker (15622970) June 24, 2015 IS3220 [email protected] Lab #5 - Penetration Testing a pfSense Firewall 1. What does an effective penetration test consist of? network scanning, port scanning, vulnerability analysis, and exploitation. 2. Which is not part of the Attacker Kill Chain? d. System Hardening 3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability scan because different vulnerability scanners may get different results. True or False? true 4. It is important to rerun a vulnerability scan after patching programs or closing vulnerabilities because in closing some you may have opened others. True or False? true 5. Domain Name Service runs on port . 53 6. Network 1, including the host connection for the firewall, is a part of the CIDR /24 subnetwork.

Upload: damon-mrfixit-baker

Post on 07-Dec-2015

190 views

Category:

Documents


0 download

DESCRIPTION

Lab 5 for IS3220

TRANSCRIPT

Page 1: IS3220lab5

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Lab #5 - Penetration Testing a pfSense Firewall

1. What does an effective penetration test consist of? network scanning, port scanning, vulnerability analysis, and exploitation.

2. Which is not part of the Attacker Kill Chain? d. System Hardening

3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability scan because different vulnerability scanners may get different results. True or False? true

4. It is important to rerun a vulnerability scan after patching programs or closing vulnerabilities because in closing some you may have opened others. True or False? true

5. Domain Name Service runs on port . 53

6. Network 1, including the host connection for the firewall, is a part of the CIDR /24 subnetwork.