1. Right Answer: A
Explanation: Web applications commonly experience SQL injection, buffer overflow, and cross-site scripting vulnerabilities. Virtual Machine (VM) Escape attacks work against the hypervisor of a virtualization platform and are not generally exploitable over the Web.
2. Right Answer: D
Explanation: Pre-engagement survey is an informal document that provides a great way to capture information that is necessary to develop a course of action for the penetration test and it can also be used for cost estimation for the user. It is also known as a scoping document.
3. Right Answer: B
Explanation: A Non-Disclosure Agreement (NDA) protects the proprietary data and intellectual property of a business. It is a confidentiality agreement.
4. Right Answer: A
Explanation: During a penetration test, limited access refers to a kind of starting position where testers are providing initial connectivity to the targets. This may take the procedure of a physical network switch connection, the SSID (Service Set Identifier) and password to the organization-s Wi-Fi network, or IP address whitelisting.
5. Right Answer: A
Explanation: Advanced Persistent Threat, or APT is a type of threat actor with red team assessment, it is usually conducted in a manner consistent with real world operation.