Ethical Hacking
Which of the following needs to be in the GRUB to run a terminal with root permissions?
'rw initrd=/install/gtk/initrd.gz quiet splash init=/bin/bash', to have read-write permissions.
Why may cookies be stolen via XSS?
To steal another user's session.
Which of the following user types has the highest privileges in a Windows enterprise environment?
Enterprise admin
Which of the following is not a HASH algorithm?
SHA-67
Which of the following protocols is exploited to achieve the On-Path position?
ARP
Which of the following is the BEST way to mitigate unwanted pre-boot access to a Windows machine?
BIOS password
Which of the following is not an automated web application vulnerability scanning tool?
Bettercap
Which of the following is true regarding an SFX attack? Choose all correct answers.
SFX are self-extracting executables. SFX can be used to deceive a victim into running background executables and scripts.
Which SQL query is used to change existing values?
UPDATE
A password on the GRUB boot loader in Linux systems prevents which of the following? (Select two.)
Unwanted reboots Editing
Which SQL Injection attack is the easiest to perform?
Error based SQLi
What does Talos do?
Gathers global information about cyber attacks
Which of the following is not a server-side technology?
HTML
Which of the following is true about Hashcat?
Hashcat can use the GPU as the processing unit for brute-force attacks.
Which establishment needs to be HIPAA certified?
Hospitals
What are social engineering attacks based on?
Human errors
Which of the following is true regarding XSS?
It is a client-side attack.
What is EternalBlue?
Known Windows exploit
Which of the following is used to perform customized network scans?
Nmap
Which of the following does an ethical hacker require to start evaluating a system?
Permission