Module 4B. Post-Exploitation - Linux Privilege Escalation

Module 4B. Post-Exploitation - Linux Privilege Escalation

University

22 Qs

quiz-placeholder

Similar activities

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

Round 1 ( RHA Learner Contest )

Round 1 ( RHA Learner Contest )

University

20 Qs

Python MCQ

Python MCQ

University

20 Qs

Visualisasi data

Visualisasi data

8th Grade - University

20 Qs

WML & WAP

WML & WAP

University

20 Qs

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

Python Functions and File Operations Quiz cyber 2025

Python Functions and File Operations Quiz cyber 2025

University

18 Qs

Software Engineering Quiz 1

Software Engineering Quiz 1

University

20 Qs

Module 4B. Post-Exploitation - Linux Privilege Escalation

Module 4B. Post-Exploitation - Linux Privilege Escalation

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Sebastian Zamorano

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Privilege Escalation

To increase your access and control on the exploited machine
To delete user accounts
To increase system performance
To simplify system administration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two types of privilege escalation?

Vertical and Diagonal
Horizontal and Vertical
Internal and External
Systematic and Random

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary factors that enable privilege escalation?

User negligence and system updates
Strong passwords and firewalls
Vulnerabilities and misconfigurations
Encrypted files and secure networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the sudo command contribute to privilege escalation?

It limits user permissions
It allows running commands with another user's privileges
It tracks user activity
It simplifies system management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of SUID permissions in Linux?

To restrict file access to root only
To delete files securely
To execute a file with the permissions of the file owner
To encrypt file contents

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a critical aspect of managing file permissions in Linux for security?

Regularly changing file names
Preventing unauthorized user access to files
Increasing the number of file backups
Ensuring files are readable by all users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the /etc/shadow file important in Linux?

It contains encrypted password information for user accounts
It lists all the installed software
It stores the system's network configurations
It logs user activity on the system

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?