Computer Science

Lab 5 – Assessment Worksheet

Penetration Testing a pfSense Firewall Course Name and Number: ________________________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ________________________________________________________________ Lab Due Date: ________________________________________________________________

Lab Assessment Questions

1. What does an effective penetration test consist of?

2. Which is not part of the attacker kill chain?

a) Reconnaissance b) Exploitation c) Weaponization d) System hardening

3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability

scan because different vulnerability scanners may get different results. True or False?

4. It is important to re-run a vulnerability scan after patching programs or closing vulnerabilities. True or False?

5. Domain Name Service runs on port ___.

6. Explain the difference between LAN and WAN firewall rules.

Course Name andNumber:
StudentName:
Instructor Name:
Lab Due Date:
q3:
Group2: Off
q1:
q4:
q6:
q5:

Order now and get 10% discount on all orders above $50 now!!The professional are ready and willing handle your assignment.

ORDER NOW »»