Question 1
In a web app engagement following PTES, which activity should you complete before touching the target?
Vulnerability analysis
Exploitation
Pre-engagement interactions
Post-exploitation
Question 2
A client wants a repeatable, test-case-driven checklist that maps to web app areas like auth, session, and client-side. Which standard fits best?
OSSTMM
OWASP WSTG
PTES
NIST 800-115 only
Question 3
You’re asked to include physical and wireless testing alongside web testing and to produce measureable, verifiable results. Which methodology explicitly emphasizes that?
OSSTMM
WSTG
PTES
CIS Controls
Question 4
During testing, you find weak session tokens and missing logout invalidation. Which WSTG categories primarily cover this?
WSTG-INPV and WSTG-CRYP
WSTG-SESS and WSTG-ATHN
WSTG-BUSL and WSTG-CLNT
WSTG-API and WSTG-CONF
Question 5
Pick the most accurate example of an attack surface from your list that commonly leads to RCE if mishandled:
Cookies with HttpOnly
set
Search box with client-side validation only
CSP with default-src 'self'
File upload functions without validation
Question 6
You suspect BOLA/IDOR in APIs. Which tool pairing from your list helps you intercept, replay, and fuzz API requests fastest?
Nikto + Wappalyzer
Burp Suite + WFuz
SQLmap + Hydra
Dirb + WhatWeb
Question 7
Your manager asks the difference between vulnerability scanning and penetration testing in one line of outcome:
Scanning proves exploitability; pentesting lists CVEs
Scanning is manual; pentesting is automated
Scanning reports potential issues; pentesting confirms exploitability with impact
Both are identical if tools are updated
Question 8
After importing Burp’s CA, your HTTP history is flooded. Which two features from your text help reduce noise without losing required traffic?
Turn off Proxy
Disable TLS 1.3 in the browser
Only use system-wide proxy so all apps route via Burp
Use Proxy → Options filters and apply HTTP history “Filter:” controls
Question 9
You set up Burp and see HTTP requests but no HTTPS. What’s the minimum corrective action per your steps?
Switch Burp port from 8080 to 443
Use system proxy instead of browser proxy
Export Burp CA (DER) and import it as a trusted root in the browser
Enable “Intercept is on”
Question 10
You’re wrapping up a sprint-bound web security test. Which combined plan best reflects a structured methodology → attack surface → tooling flow?
Run Nikto; if clean, skip WSTG
Follow PTES phases; map tests to WSTG categories; focus on high-risk areas (auth/session, inputs, APIs, uploads); use Burp, ZAP, SQLmap, Dirb/Gobuster, Hydra as needed; report with exploit evidence and fixes
Start with OSSTMM wireless, then only do client-side checks
Run Wappalyzer; if WordPress, always exploit with Metasploit first
There are 10 questions to complete.