You are on page 1of 1

Damon Baker (15622970)

IS3220

June 24, 2015


dbaker158@email.itt-tech.edu
Lab #5 - Penetration Testing a pfSense Firewall

1. What does an effective penetration test consist of? network scanning, port scanning, vulnerability analysis, and
exploitation.
2. Which is not part of the Attacker Kill Chain? d. System Hardening
3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability scan because different vulnerability
scanners may get different results. True or False? true
4. It is important to rerun a vulnerability scan after patching programs or closing vulnerabilities because in closing some
you may have opened others. True or False? true
5. Domain Name Service runs on port . 53
6. Network 1, including the host connection for the firewall, is a part of the CIDR /24 subnetwork.

You might also like