
Module 4A. Post-Exploitation - Linux Local Enumeration
Authored by Sebastian Zamorano
Computers
University
Used 16+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts is NOT one of the main goals of post exploitation?
Local Enumeration
Persistence
Privilege Escalation
Remote Code Execution
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts is related to increase the level of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts is related to create a reliable connection that can be recovered during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts is related to remove the evidence of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following concepts is related to get information of the exploited system during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which valuable information can we get by enumerating the hostname of an exploited machine?
It's users
It's role on the organization
It's Operative System
It's difficulty of post exploitation
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an unique numerical identifier assigned to each user on a Linux system?
UID
SUID
GID
OS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?