Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

University

21 Qs

quiz-placeholder

Similar activities

Test Your Knowledge Google Drive

Test Your Knowledge Google Drive

9th Grade - University

20 Qs

Quiz de Formulas en excel

Quiz de Formulas en excel

University

20 Qs

Normas e Padroes de Seguranca - Quiz 1

Normas e Padroes de Seguranca - Quiz 1

University

20 Qs

Properties in Swift coding

Properties in Swift coding

University

18 Qs

QUIZ 4 Mobile App Development Quiz

QUIZ 4 Mobile App Development Quiz

University

20 Qs

Teknologi Informasi Dan Literasi Data

Teknologi Informasi Dan Literasi Data

University

20 Qs

Secure Programming Practices

Secure Programming Practices

University

23 Qs

IT Essential Chapter 5 Windows Installations

IT Essential Chapter 5 Windows Installations

University

20 Qs

Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Sebastian Zamorano

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is NOT one of the main goals of post exploitation?

Local Enumeration
Persistence
Privilege Escalation

Remote Code Execution

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to increase the level of access during post exploitation?

Persistence
Privilege Escalation
Local Enumeration
Obfuscation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to create a reliable connection that can be recovered during post exploitation?

Persistence
Privilege Escalation
Local Enumeration
Obfuscation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to remove the evidence of access during post exploitation?

Persistence
Privilege Escalation
Local Enumeration
Obfuscation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to get information of the exploited system during post exploitation?

Persistence
Privilege Escalation
Local Enumeration
Obfuscation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which valuable information can we get by enumerating the hostname of an exploited machine?

It's users
It's role on the organization
It's Operative System
It's difficulty of post exploitation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an unique numerical identifier assigned to each user on a Linux system?

UID
SUID
GID
OS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?