
Project Scoping 27
Exhibit 7. Bottom-Up Scope Questionnaire (continued)
Firewalls
Boundary firewall(s) type: [list]
Number of boundary firewall(s): [x]
Internal firewall(s) type: [list]
Number of internal firewall(s): [x]
Cryptographic Analysis
Client has requested that the test team examine the design of the following cryptosystems:
[List cryptosystems, such as PKI system or IPSec, that have been requested]
Password Cracking
Windows NT
SMB capture passwords: [Yes/No]
Retrieve from domain controller: [Yes/No]
Brute-force standard alphabet: [Yes/No]
Brute-force all characters: [Yes/No]
Time to run: [Hours, up to 24]
Novell NetWare
Brute-force standard alphabet: