Chapter 4.2 Privilege Escalation

Chapter 4.2 Privilege Escalation

University

5 Qs

quiz-placeholder

Similar activities

IT & OT Operations

IT & OT Operations

1st Grade - Professional Development

10 Qs

PROJECT LIFECYCLE

PROJECT LIFECYCLE

University

10 Qs

Chapter 4

Chapter 4

University

10 Qs

DCIT Week 1 Quiz

DCIT Week 1 Quiz

University

10 Qs

Fuel User Group Member Quiz

Fuel User Group Member Quiz

University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

Unit 1 CPM Recap

Unit 1 CPM Recap

University

10 Qs

Asp.net quiz

Asp.net quiz

University - Professional Development

10 Qs

Chapter 4.2 Privilege Escalation

Chapter 4.2 Privilege Escalation

Assessment

Quiz

Other

University

Medium

Created by

MOHD MUKHTAR

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What an attacker do when execute privilege escalation?

Restore files

Install malicious program

View application

Run Kali Linux

2.

OPEN ENDED QUESTION

3 mins • 1 pt

List two types of Privilege Escalation

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose correct tools to execute Privilege Escalation

BeRoot

Metasploit

John the R

Nmap

4.

OPEN ENDED QUESTION

3 mins • 1 pt

List two ways to countermeasure Privilege Escalation

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Privilege Escalation?

An attacker guess password using brute force attack.

An attacker gain access to the network using non-admin user account and gain administrative privileges.

An attacker breach the target office and search information in bin.

An attacker create a backdoor and steal confidential information.