Volume 2

Volume 2

Professional Development

29 Qs

quiz-placeholder

Similar activities

Security

Security

12th Grade - Professional Development

24 Qs

Planning a Network Infrastructure

Planning a Network Infrastructure

KG - Professional Development

26 Qs

7.2 Quiz Asset Management Process and Technology Integration

7.2 Quiz Asset Management Process and Technology Integration

Professional Development

28 Qs

Institute of Marine Technology,Bagerhat Portative Assessment

Institute of Marine Technology,Bagerhat Portative Assessment

Professional Development

25 Qs

Net+ Day 2 Ports, Protocols and Network Devices

Net+ Day 2 Ports, Protocols and Network Devices

Professional Development

30 Qs

UJIAN MID SEMESTER 1 X RPL MAPEL DASAR DESAIN GRAFIS

UJIAN MID SEMESTER 1 X RPL MAPEL DASAR DESAIN GRAFIS

Professional Development

25 Qs

Desain Grafis

Desain Grafis

University - Professional Development

24 Qs

ulangan kelas 2

ulangan kelas 2

Professional Development

25 Qs

Volume 2

Volume 2

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Sweden Garcia

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which TCP flag indicates that a connection should be torn down abruptly?

Responses?

ACK

URG

FIN

RST

Answer explanation

Six control bits describe the packet's role in the connection:

SYN: Synchronize

ACK: Acknowledgment

FIN: End a connection

RST: Tear down a connection

URG: Urgent data are included

PSH: Data should be pushed through the TCP stack

2.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which of the following is a challenge of working with OSINT data?

Responses?

Using bitcoin to pay for access to data services

Properly decrypting various data sources

Converting different HTML and XML versions

Collecting from numerous and disparate data sources

Answer explanation

The primary problem with OSINT data collection is the number of unique data sources, each providing disparate data from varied search criteria. Many OSINT data services are free, but some require registration prior to use. Other OSINT data services require payment, sometimes charged as a price per search, a subscription model, a one-time cost, or one of many other variations.

3.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

What is the following Google search designed to do?

wireless site:somecompany.net

Search for all instances of the term "wireless" on the somecompany.net website

Find pages similar to somecompany.net that also mention the term "wireless"

Display all pages containing both the terms "somecompany.net" and "wireless site"

Display all pages with the term "wireless" in them that link to somecompany.net

Answer explanation

The site: directive allows an attacker to search for pages on just a single site or domain, narrowing down and focusing the search. The search "wireless site:somecompany.net" produces a search result for the term "wireless" limited to the site somecompany.net.

4.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

When interrogating a DNS server to discover information about the target domain, what tool can be used in controlling the output of DNS queries with more granularity?

dnsstuff

Dig

mxtoolbox

dnsquery

Answer explanation

The two primary tools to interrogate DNS servers are nslookup and Dig. Nslookup is available by default on Windows systems and some UNIX platforms. Dig is arguably a more powerful tool since you can control the output of DNS queries with more granularity than with nslookup. Windows users can install the BIND software that includes Dig, allowing you to run Dig on Windows systems as well.

5.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

DeepBlueCLI is an open-source framework that automatically parses Windows event logs. What log does DeepBlueCLI parse when you run it with no arguments?

.\DeepBlue.ps1

PowerShell Event Log

Security Event Log

Application Event Log

System Event Log

Answer explanation

When at a PowerShell prompt as an Administrator and run .\DeepBlue.ps1 without any arguments, the security log will be read.

6.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

When performing reconnaissance, what data is collected before sending any packets to the target?

Open ingress ports

A network diagram

Open egress ports

Open-source intelligence

Answer explanation

Before sending the first packet to a target, a modern attacker will harvest open-source intelligence (OSINT) information. OSINT refers to the cumulative data available about a target online, whether that is a target organization, target person, or other entity.

7.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which tool can detect attacks by analyzing offline Windows event log files?

DeepBlueCLI

Metasploit Log Analyzer

SRUM-Dump

PowerShell Empire

Answer explanation

DeepBlueCLI can detect multiple attacks, including several Metasploit exploits, Mimikatz, PowerShell Empire, password guessing, and password spraying. It can be used to analyze offline log files as well as event logs on the local system or a system on the Windows domain network.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?