cybersecurity

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the correct incident response lifecycle per the NIST incident response methodology

Preparation, Detection and Analysis, Containment, Termination, Recovery, and Post-Incident Activity

Which commands would you use to gracefully exit in case of an error

Try and Except

Which of the following tools can be used to obfuscate malware code

UPX

Which of the following is a Windows Event Viewer classification

Alert, Error, Debug

Which SQL Injection attack is the easiest to perform?

Error based SQL

Which of the following is true regarding XSS

It is a client-side attack

Which of the following is not an automated web application vulnerability scanning tool?

Bettercap

Which of the following is not a tool that is used for data carving

DumpIt

Which of the following is the most common file system used in Linux distributions?

Ext4

What does Talos do

Gathers global information about cyber attacks

Which of the following should be monitored during dynamic malware analysis

Network activity, File system changes, Registry changes

What is the difference between Wireshark and tcpdump

tcpdump is command based; Wireshark has a GUI interface

What would be the output of the following code names = ['Dave', 'John', 'Ben', 'Jud'] for name in names print(name) if name == 'Ben' break else: print("All names were printed!")

Dave John Ben

Which tool should an investigator use to dynamically investigate malware?

Debugger

A password on the GRUB boot loader in Linux systems prevents which of the following

Unwanted reboots, Editing

Which of the following is not a containment strategy for a cybersecurity incident

Update IDS rules

Which of the following are commonly used for malware persistence?

Scheduled tasks, Services, Registry keys

You installed PyCharm and started writing a little script that prints out "I love hacking with Python." However, PyCharm won't allow running the script. What can be the solution to the problem?

Setting an interpreter

What happens when running the following code with open("MyFile.txt", "w") as file: file.write("Hello World")

"Hello World" is written inside "MyFile.txt"

dictionary = {"list": [1, 2, 3]} dictionary["list"].append([4, 5, 6]) for value in dictionary print(value) What is the output of the code

"list"

Which of the following needs to be in the GRUB to run the terminal with root permissions

'rw initrd=/install/gtk/initrd.gz quiet splash init=/bin/bash' to have read-write permissions

How would you assign a tuple to variable myTuple

myTuple = (1, 2, 'name', 'time')

Which of the following is the BEST way to mitigate pre-boot access to a Windows machine?

Full disk encryption

Which of the following is true about Hashcat

Hashcat can use the GPU as the processing unit for brute-force attacks

While performing the Echo Communication home project, the command socket.accept() crashed the script What could be the problem

The accept() command was not assigned with two variables

What did the programmer forget in the following code: import datetime Myfile = open("myfile.txt","r") print(MyFile.read()) Date = datetime.datetime.now() print("\n",Date.time())

The file needs to be closed to remove the security risk

Which of the following is true

When data is erased from the operating system, it remains on the HDD until overwritten


Conjuntos de estudio relacionados

Sport Finance Final Exam Questions

View Set

ati pharm proctored exam, ATI Pharmacology Proctor 2019

View Set

LIFSCI 7B XL - Animation: Carbon cycle

View Set

C743 Data Mining 1 - Terminology

View Set

Individ Health Assess. Midterm Questions

View Set

Chapter 2 - Insurance & Health Care Agencies

View Set