Dooku 2.0 Cybersecurity Tactics

Dooku 2.0 Cybersecurity Tactics

Assessment

Interactive Video

Computers

10th Grade - University

Hard

Created by

Aiden Montgomery

FREE Resource

The video tutorial explains the sophisticated Dooku 2.0 APT campaign, which operates entirely in memory, concealing data in images. It details the infection process, privilege escalation, payload execution, and lateral movement within a network. The attackers use high uptime servers for reinfection and data exfiltration via HTTP. The video also demonstrates how Javelin technology can disrupt such attacks by obfuscating data and detecting lateral movement attempts.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely initial infection vector for Dooku 2.0?

USB drive

Spear phishing attack

Software vulnerability

Physical access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the attacker use to escalate privileges after infecting the machine?

Social engineering

Zero-day exploit

Brute force attack

Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which payloads are used to disable security suites in Dooku 2.0?

Payloads A and B

Payloads X and Y

Payloads Q and K

Payloads L.G and Hide

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why does Dooku 2.0 use high uptime servers?

To perform DDoS attacks

To store stolen data

To reinfect computers that get disinfected

To host malicious websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one method Dooku 2.0 uses to move laterally within a network?

Pass the hash

SQL injection

Phishing emails

Man-in-the-middle attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Dooku 2.0 conceal exfiltrated data?

Hiding it in JPEG and GIF images

Encrypting it with AES

Compressing it into ZIP files

Storing it in plain text

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol does Dooku 2.0 use to funnel traffic to the high uptime server?

Telnet

SSH

SMB pipes

FTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?