Chapter 4.2 Privilege Escalation

Chapter 4.2 Privilege Escalation

University

5 Qs

quiz-placeholder

Similar activities

Chapter 6 Quiz

Chapter 6 Quiz

University

10 Qs

Blockchain Quiz 2

Blockchain Quiz 2

6th Grade - Professional Development

10 Qs

Asp.net quiz

Asp.net quiz

University - Professional Development

10 Qs

IT & OT Operations

IT & OT Operations

1st Grade - Professional Development

10 Qs

Best of Football

Best of Football

KG - Professional Development

10 Qs

LDK 4 - Kepatahan dan Rawatan

LDK 4 - Kepatahan dan Rawatan

University

10 Qs

Introduction Of Microcontroller

Introduction Of Microcontroller

University

10 Qs

CPCE - Social and Cultural

CPCE - Social and Cultural

University

5 Qs

Chapter 4.2 Privilege Escalation

Chapter 4.2 Privilege Escalation

Assessment

Quiz

Other

University

Medium

Created by

MOHD MUKHTAR

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What an attacker do when execute privilege escalation?

Restore files

Install malicious program

View application

Run Kali Linux

2.

OPEN ENDED QUESTION

3 mins • 1 pt

List two types of Privilege Escalation

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose correct tools to execute Privilege Escalation

BeRoot

Metasploit

John the R

Nmap

4.

OPEN ENDED QUESTION

3 mins • 1 pt

List two ways to countermeasure Privilege Escalation

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Privilege Escalation?

An attacker guess password using brute force attack.

An attacker gain access to the network using non-admin user account and gain administrative privileges.

An attacker breach the target office and search information in bin.

An attacker create a backdoor and steal confidential information.