TRIVIA – Penetration Testing

Oct 27, 2025

Sonja Soderlund is an Oregon-based B2B freelance writer. Whether writing about mainframe computers, educational technology, or sustainable retail, she strives to bring clarity to complex issues. Connect with her or LinkedIn.

Mainframes have long been known for their unmatched reliability and security—but even the most trusted systems can hide surprises beneath the surface. As technology evolves, so do the tactics of those trying to exploit it. Penetration testing (pen testing), or “ethical hacking,” has become an essential way to uncover weaknesses that traditional audits might miss.

Planet Mainframe recently published an article by Mark Wilson (Technical Director at Vertali and Chief Editor and Producer of Cheryl Watson’s Tuning Letter) on the subject, in which he states that “the goal [of pen testing] “is not disruption but discovery: to identify cracks in a system before someone else does.”

Think you know your stuff when it comes to pen testing? Take our quiz to test your knowledge of vulnerabilities, testing techniques, and defense strategies that keep the world’s most critical systems safe.

Editor’s note from Penney Berryman — A Gold Star goes out to those who called out the error in the previous round of Trivia!

1. What is the main objective of a pen test?

 
 
 
 

2. Which two main stages typically make up a pen test on the mainframe?

 
 
 
 

3. During the footprinting stage, which type of data might a tester review to gather system information?

 
 
 
 

4. Name one tool commonly used for data gathering during mainframe footprinting.

 
 
 
 

5. In the exploitation phase, testers often begin with what type of account?

 
 
 
 

6. Which of the following weaknesses might pen testers exploit on a mainframe?

 
 
 
 

7. Why do mainframe security weaknesses often persist for years?

 
 
 
 

8. RACF, ACF2, and TSS are examples of what type of mainframe component?

 
 
 
 

9. Why is pen testing on the mainframe considered critical for risk management?

 
 
 
 

10. Which of the following is not usually listed as one of the benefits of pen testing?

 
 
 
 

1 Comment

  1. BILL C

    I disagree with 7. Limited and/or incorrect admin access is a prime reason for persistence of mainframe security weakness. There are limited numbers of QUALIFIED admins in the mainframe space.

    Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

Sign up to receive the latest mainframe information

This field is for validation purposes and should be left unchanged.

Read More

❓Linux: Tux in the Data Center

❓Linux: Tux in the Data Center

Our quiz today focuses on Linux, which Linus Torvalds originally created in the early 90s for x86 desktop hardware—about as far from a mainframe as you can get. But its life on mainframes has proved remarkably powerful. Through the mid-to-late 90s, Linux gradually...

❓ Influential Mainframer Trivia: Eleanor Kolchin

❓ Influential Mainframer Trivia: Eleanor Kolchin

For the month of April, Planet Mainframe puts the spotlight on influential mainframers, and this week our trivia quiz is all about mainframe trailblazer Eleanor Kolchin. Kolchin built her career at a pivotal moment in computing, when computing machines were...

❓ Influential Mainframer Trivia: Eleanor Kolchin

❓Influential Mainframer Trivia: Bob Evans

At Planet Mainframe, April is dedicated to honoring influential mainframers past and present. This week’s quiz dives into the life and times of Bob Evans (1927–2004), who played a central role in shaping modern enterprise computing during his career at IBM. ...