Self review: Plan of attack :Cybersecurity Tools and Technologies (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Initial phase of a penetration test
❌ Escalation
✅ Reconnaissance
❌ Enumeration
❌ Exploitation
Explanation:
Reconnaissance is the information-gathering stage and always the starting point.
2. Tool recommended for automated network scanning in enumeration
❌ Metasploit
✅ Nmap
❌ Azure Security Center
❌ OWASP WebGoat
Explanation:
Nmap is the standard tool for port scanning, host discovery, and enumeration.
3. Purpose of maintaining access (persistence)
❌ Demonstrate data security risks
❌ Exploit vulnerabilities
❌ Escalate privileges
✅ Ensure continued access for further testing
Explanation:
Persistence allows testers to continue assessments without re-exploiting entry points.
4. Importance of Network Architecture Diagram
❌ Lists vulnerabilities
❌ Shows timeline
✅ Provides a visual representation of the network structure
❌ Outlines compliance
Explanation:
It helps testers understand network flow, segmentation, and target systems.
5. Purpose of a debriefing session
❌ Escalate vulnerabilities
✅ Discuss findings, remediation plans, and lessons learned
❌ Celebrate
❌ Obtain permission
Explanation:
Debriefing communicates results and next steps to stakeholders.
6. Primary goal of the exploitation phase
❌ Escalate privileges
❌ Gather info
❌ Develop policies
✅ Identify and exploit vulnerabilities in the target system
Explanation:
Exploitation confirms whether discovered vulnerabilities can be leveraged.
7. Focus when prioritizing vulnerabilities
❌ Order discovered
❌ Complexity of remediation
❌ Number found
✅ Criticality, potential impact, and exploitability
Explanation:
Risk-based prioritization ensures high-impact vulnerabilities are fixed first.
8. Purpose of Rules of Engagement
❌ Celebrate completion
❌ Obtain approvals
❌ Escalate vulnerabilities
✅ Define scope, testing hours, and limitations
Explanation:
It ensures testing is safe, legal, and aligned with stakeholder expectations.
9. Primary goal of escalation phase
❌ Maintain access
❌ Exploit vulnerabilities
✅ Escalate privileges on the target system
❌ Ethical hacking principles
Explanation:
Privilege escalation expands the tester’s access beyond initial entry.
10. Purpose of the Communication Plan
❌ Develop policies
❌ Obtain permission
❌ Prioritize vulnerabilities
✅ Establish communication channels for reporting progress & findings
Explanation:
A communication plan ensures stakeholders are informed throughout testing.
🧾 Summary Table
| Q | Correct Answer |
|---|---|
| 1 | Reconnaissance |
| 2 | Nmap |
| 3 | Ensure continued access |
| 4 | Network structure diagram |
| 5 | Discuss findings & remediation |
| 6 | Identify/exploit vulnerabilities |
| 7 | Criticality + impact + exploitability |
| 8 | Define scope & limitations |
| 9 | Escalate privileges |
| 10 | Communication channels |