ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 25 - PT0-003 discussion

Report
Export

A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client's current security tools. The threat-modeling team indicates the TTPs in the list might affect their internal systems and servers. Which of the following actions would the tester most likely take?

A.
Use a BAS tool to test multiple TTPs based on the input from the threat-modeling team.
Answers
A.
Use a BAS tool to test multiple TTPs based on the input from the threat-modeling team.
B.
Perform an internal vulnerability assessment with credentials to review the internal attack surface.
Answers
B.
Perform an internal vulnerability assessment with credentials to review the internal attack surface.
C.
Use a generic vulnerability scanner to test the TTPs and review the results with the threat-modeling team.
Answers
C.
Use a generic vulnerability scanner to test the TTPs and review the results with the threat-modeling team.
D.
Perform a full internal penetration test to review all the possible exploits that could affect the systems.
Answers
D.
Perform a full internal penetration test to review all the possible exploits that could affect the systems.
Suggested answer: A

Explanation:

BAS (Breach and Attack Simulation) tools are specifically designed to emulate multiple TTPs (Tactics, Techniques, and Procedures) used by adversaries. These tools can simulate various attack vectors in a controlled manner to test the effectiveness of an organization's security defenses and response mechanisms. Here's why option A is the best choice:

Controlled Testing Environment: BAS tools provide a controlled environment where multiple TTPs can be tested without causing unintended damage to the internal systems and servers. This is critical when the threat-modeling team indicates potential impacts on internal systems.

Comprehensive Coverage: BAS tools are designed to cover a wide range of TTPs, allowing the penetration tester to simulate various attack scenarios. This helps in assessing the reactions (alerted, blocked, and others) by the client's security tools comprehensively.

Feedback and Reporting: These tools provide detailed feedback and reporting on the effectiveness of the security measures in place, including which TTPs were detected, blocked, or went unnoticed. This information is invaluable for the threat-modeling team to understand the current security posture and areas for improvement.

Reference from Pentest:

Anubis HTB: This write-up highlights the importance of using controlled tools and methods for testing security mechanisms. BAS tools align with this approach by providing a controlled and systematic way to assess security defenses.

Forge HTB: Emphasizes the use of various testing tools and techniques to simulate real-world attacks and measure the effectiveness of security controls. BAS tools are mentioned as a method to ensure comprehensive coverage and minimal risk to internal systems.

Conclusion:

Using a BAS tool to test multiple TTPs allows for a thorough and controlled assessment of the client's security tools' effectiveness. This approach ensures that the testing is systematic, comprehensive, and minimally disruptive, making it the best choice.

asked 02/10/2024
Frantisek Kohanyi Kohanyi
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first