cybersecurity
What is the correct incident response lifecycle per the NIST incident response methodology
Preparation, Detection and Analysis, Containment, Termination, Recovery, and Post-Incident Activity
Which commands would you use to gracefully exit in case of an error
Try and Except
Which of the following tools can be used to obfuscate malware code
UPX
Which of the following is a Windows Event Viewer classification
Alert, Error, Debug
Which SQL Injection attack is the easiest to perform?
Error based SQL
Which of the following is true regarding XSS
It is a client-side attack
Which of the following is not an automated web application vulnerability scanning tool?
Bettercap
Which of the following is not a tool that is used for data carving
DumpIt
Which of the following is the most common file system used in Linux distributions?
Ext4
What does Talos do
Gathers global information about cyber attacks
Which of the following should be monitored during dynamic malware analysis
Network activity, File system changes, Registry changes
What is the difference between Wireshark and tcpdump
tcpdump is command based; Wireshark has a GUI interface
What would be the output of the following code names = ['Dave', 'John', 'Ben', 'Jud'] for name in names print(name) if name == 'Ben' break else: print("All names were printed!")
Dave John Ben
Which tool should an investigator use to dynamically investigate malware?
Debugger
A password on the GRUB boot loader in Linux systems prevents which of the following
Unwanted reboots, Editing
Which of the following is not a containment strategy for a cybersecurity incident
Update IDS rules
Which of the following are commonly used for malware persistence?
Scheduled tasks, Services, Registry keys
You installed PyCharm and started writing a little script that prints out "I love hacking with Python." However, PyCharm won't allow running the script. What can be the solution to the problem?
Setting an interpreter
What happens when running the following code with open("MyFile.txt", "w") as file: file.write("Hello World")
"Hello World" is written inside "MyFile.txt"
dictionary = {"list": [1, 2, 3]} dictionary["list"].append([4, 5, 6]) for value in dictionary print(value) What is the output of the code
"list"
Which of the following needs to be in the GRUB to run the terminal with root permissions
'rw initrd=/install/gtk/initrd.gz quiet splash init=/bin/bash' to have read-write permissions
How would you assign a tuple to variable myTuple
myTuple = (1, 2, 'name', 'time')
Which of the following is the BEST way to mitigate pre-boot access to a Windows machine?
Full disk encryption
Which of the following is true about Hashcat
Hashcat can use the GPU as the processing unit for brute-force attacks
While performing the Echo Communication home project, the command socket.accept() crashed the script What could be the problem
The accept() command was not assigned with two variables
What did the programmer forget in the following code: import datetime Myfile = open("myfile.txt","r") print(MyFile.read()) Date = datetime.datetime.now() print("\n",Date.time())
The file needs to be closed to remove the security risk
Which of the following is true
When data is erased from the operating system, it remains on the HDD until overwritten