Volume 2

Quiz
•
Computers
•
Professional Development
•
Easy
Sweden Garcia
Used 1+ times
FREE Resource
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which TCP flag indicates that a connection should be torn down abruptly?
Responses?
ACK
URG
FIN
RST
Answer explanation
Six control bits describe the packet's role in the connection:
SYN: Synchronize
ACK: Acknowledgment
FIN: End a connection
RST: Tear down a connection
URG: Urgent data are included
PSH: Data should be pushed through the TCP stack
2.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which of the following is a challenge of working with OSINT data?
Responses?
Using bitcoin to pay for access to data services
Properly decrypting various data sources
Converting different HTML and XML versions
Collecting from numerous and disparate data sources
Answer explanation
The primary problem with OSINT data collection is the number of unique data sources, each providing disparate data from varied search criteria. Many OSINT data services are free, but some require registration prior to use. Other OSINT data services require payment, sometimes charged as a price per search, a subscription model, a one-time cost, or one of many other variations.
3.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
What is the following Google search designed to do?
wireless site:somecompany.net
Search for all instances of the term "wireless" on the somecompany.net website
Find pages similar to somecompany.net that also mention the term "wireless"
Display all pages containing both the terms "somecompany.net" and "wireless site"
Display all pages with the term "wireless" in them that link to somecompany.net
Answer explanation
The site: directive allows an attacker to search for pages on just a single site or domain, narrowing down and focusing the search. The search "wireless site:somecompany.net" produces a search result for the term "wireless" limited to the site somecompany.net.
4.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
When interrogating a DNS server to discover information about the target domain, what tool can be used in controlling the output of DNS queries with more granularity?
dnsstuff
Dig
mxtoolbox
dnsquery
Answer explanation
The two primary tools to interrogate DNS servers are nslookup and Dig. Nslookup is available by default on Windows systems and some UNIX platforms. Dig is arguably a more powerful tool since you can control the output of DNS queries with more granularity than with nslookup. Windows users can install the BIND software that includes Dig, allowing you to run Dig on Windows systems as well.
5.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
DeepBlueCLI is an open-source framework that automatically parses Windows event logs. What log does DeepBlueCLI parse when you run it with no arguments?
.\DeepBlue.ps1
PowerShell Event Log
Security Event Log
Application Event Log
System Event Log
Answer explanation
When at a PowerShell prompt as an Administrator and run .\DeepBlue.ps1 without any arguments, the security log will be read.
6.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
When performing reconnaissance, what data is collected before sending any packets to the target?
Open ingress ports
A network diagram
Open egress ports
Open-source intelligence
Answer explanation
Before sending the first packet to a target, a modern attacker will harvest open-source intelligence (OSINT) information. OSINT refers to the cumulative data available about a target online, whether that is a target organization, target person, or other entity.
7.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which tool can detect attacks by analyzing offline Windows event log files?
DeepBlueCLI
Metasploit Log Analyzer
SRUM-Dump
PowerShell Empire
Answer explanation
DeepBlueCLI can detect multiple attacks, including several Metasploit exploits, Mimikatz, PowerShell Empire, password guessing, and password spraying. It can be used to analyze offline log files as well as event logs on the local system or a system on the Windows domain network.
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
security+ (601)

Quiz
•
9th Grade - Professio...
30 questions
Cyber Security

Quiz
•
Professional Development
24 questions
Security

Quiz
•
12th Grade - Professi...
30 questions
TURN-UP QUIZ

Quiz
•
Professional Development
30 questions
Net+ Day 2 Ports, Protocols and Network Devices

Quiz
•
Professional Development
30 questions
ITN Modules 14-15

Quiz
•
Professional Development
24 questions
RL Tema 12. Cuestionario

Quiz
•
Professional Development
24 questions
Quiz 11A: Explain the Use of Web, File/Print, and DB Services

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade