See Dee See

See Dee See

1st Grade - Professional Development

8 Qs

quiz-placeholder

Similar activities

Sonic.Exe

Sonic.Exe

3rd Grade

13 Qs

Cuanto conoses a mike crack

Cuanto conoses a mike crack

5th Grade

13 Qs

fnf

fnf

3rd - 5th Grade

7 Qs

sonic quiz 2

sonic quiz 2

1st - 12th Grade

9 Qs

super sonic Quizz

super sonic Quizz

KG - 4th Grade

9 Qs

แบบทดสอบก่อนเรียน Google Doc

แบบทดสอบก่อนเรียน Google Doc

1st - 10th Grade

10 Qs

Los compadretes

Los compadretes

3rd Grade

9 Qs

GTA V KAROL

GTA V KAROL

KG - Professional Development

10 Qs

See Dee See

See Dee See

Assessment

Quiz

Fun

1st Grade - Professional Development

Hard

Created by

Francisco Medeiros

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement concerning "PsExec.exe -s -i cmd.exe" is true ?

PsExec.exe will spawn an Administrator cmd.exe

PsExec will spawn an Administrator cmd.exe via the PsExeSvc.exe process running as a service

PsExec will spawn a SYSTEM cmd.exe via the PsExeSvc.exe process running as a service

PsExec.exe will spawn a SYSTEM cmd.exe

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which MITRE ATT&CK technique best suits the following powershell cmdline:

"Add-Type -AssemblyName System.IdentityModel New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList 'MSSQLSvc/CorpSqlServer.corp.com:1433' "

System Service Discovery

Masquerading

Steal or Forge Kerberos Tickets

Forced Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which common Privilege Escalation technique does the following cmdline concern:

"find / -perm -u=s -type f 2>/dev/null"

Unquoted Service File Paths

Weak Service Permissions

SUID Executables

Find command Vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attacker scenario best fits the following cmdline:

"cmd.exe /Q /c tasklist /v /fo csv | findstr /i "lsass" 1> \\127.0.0.1\C$\Windows\Temp\KNwpzU 2>&1"

Credential Dumping with Impacket's Wmiexec.py

Credential Dumping with Mimikatz

Privilege Escalation with Impacket's Wmiexec.py

Credential Dumping with Impacket's Psexec.py

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the following cmdline:

echo " " | nc -vv -n -w1 72.52.206.134 80

Launch an attack on a server sending 80 separate packets in a short period of time

Identify if a server is running a service using port 80 and is reachable

Use Netcat to remotely administer the server

Use Netcat to start an RDP session on the server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DLL Side-Loading concerns a legitimate process loading a .dll that is located at ...

The same path as the executable

The system directory

The directories that are listed in the PATH environment variable

The Windows directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?

Network-based

Signature-based

Heuristic-based

Anomaly-based

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique does the following cmdline correspond to: query user

RDP Hijacking

Kerberoasting

NTLM Hash Dump

DNS Poisoning