Skip to content

Self review: Plan of attack :Cybersecurity Tools and Technologies (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. Initial phase of a penetration test

❌ Escalation
Reconnaissance
❌ Enumeration
❌ Exploitation

Explanation:
Reconnaissance is the information-gathering stage and always the starting point.


2. Tool recommended for automated network scanning in enumeration

❌ Metasploit
Nmap
❌ Azure Security Center
❌ OWASP WebGoat

Explanation:
Nmap is the standard tool for port scanning, host discovery, and enumeration.


3. Purpose of maintaining access (persistence)

❌ Demonstrate data security risks
❌ Exploit vulnerabilities
❌ Escalate privileges
Ensure continued access for further testing

Explanation:
Persistence allows testers to continue assessments without re-exploiting entry points.


4. Importance of Network Architecture Diagram

❌ Lists vulnerabilities
❌ Shows timeline
Provides a visual representation of the network structure
❌ Outlines compliance

Explanation:
It helps testers understand network flow, segmentation, and target systems.


5. Purpose of a debriefing session

❌ Escalate vulnerabilities
Discuss findings, remediation plans, and lessons learned
❌ Celebrate
❌ Obtain permission

Explanation:
Debriefing communicates results and next steps to stakeholders.


6. Primary goal of the exploitation phase

❌ Escalate privileges
❌ Gather info
❌ Develop policies
Identify and exploit vulnerabilities in the target system

Explanation:
Exploitation confirms whether discovered vulnerabilities can be leveraged.


7. Focus when prioritizing vulnerabilities

❌ Order discovered
❌ Complexity of remediation
❌ Number found
Criticality, potential impact, and exploitability

Explanation:
Risk-based prioritization ensures high-impact vulnerabilities are fixed first.


8. Purpose of Rules of Engagement

❌ Celebrate completion
❌ Obtain approvals
❌ Escalate vulnerabilities
Define scope, testing hours, and limitations

Explanation:
It ensures testing is safe, legal, and aligned with stakeholder expectations.


9. Primary goal of escalation phase

❌ Maintain access
❌ Exploit vulnerabilities
Escalate privileges on the target system
❌ Ethical hacking principles

Explanation:
Privilege escalation expands the tester’s access beyond initial entry.


10. Purpose of the Communication Plan

❌ Develop policies
❌ Obtain permission
❌ Prioritize vulnerabilities
Establish communication channels for reporting progress & findings

Explanation:
A communication plan ensures stakeholders are informed throughout testing.


🧾 Summary Table

Q Correct Answer
1 Reconnaissance
2 Nmap
3 Ensure continued access
4 Network structure diagram
5 Discuss findings & remediation
6 Identify/exploit vulnerabilities
7 Criticality + impact + exploitability
8 Define scope & limitations
9 Escalate privileges
10 Communication channels