See Dee See

See Dee See

1st Grade - Professional Development

8 Qs

quiz-placeholder

Similar activities

PD MABA 2021

PD MABA 2021

University

10 Qs

Fnf mods

Fnf mods

12th Grade

9 Qs

Hacker quiz

Hacker quiz

Professional Development

12 Qs

Sims 4 Game

Sims 4 Game

5th Grade - Professional Development

11 Qs

Fnf

Fnf

3rd Grade

12 Qs

Kamzila quiz

Kamzila quiz

2nd - 4th Grade

11 Qs

games

games

6th Grade

11 Qs

DATE Sudirman Park 6 Games

DATE Sudirman Park 6 Games

Professional Development

11 Qs

See Dee See

See Dee See

Assessment

Quiz

Fun

1st Grade - Professional Development

Hard

Created by

Francisco Medeiros

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement concerning "PsExec.exe -s -i cmd.exe" is true ?

PsExec.exe will spawn an Administrator cmd.exe

PsExec will spawn an Administrator cmd.exe via the PsExeSvc.exe process running as a service

PsExec will spawn a SYSTEM cmd.exe via the PsExeSvc.exe process running as a service

PsExec.exe will spawn a SYSTEM cmd.exe

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which MITRE ATT&CK technique best suits the following powershell cmdline:

"Add-Type -AssemblyName System.IdentityModel New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList 'MSSQLSvc/CorpSqlServer.corp.com:1433' "

System Service Discovery

Masquerading

Steal or Forge Kerberos Tickets

Forced Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which common Privilege Escalation technique does the following cmdline concern:

"find / -perm -u=s -type f 2>/dev/null"

Unquoted Service File Paths

Weak Service Permissions

SUID Executables

Find command Vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attacker scenario best fits the following cmdline:

"cmd.exe /Q /c tasklist /v /fo csv | findstr /i "lsass" 1> \\127.0.0.1\C$\Windows\Temp\KNwpzU 2>&1"

Credential Dumping with Impacket's Wmiexec.py

Credential Dumping with Mimikatz

Privilege Escalation with Impacket's Wmiexec.py

Credential Dumping with Impacket's Psexec.py

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the following cmdline:

echo " " | nc -vv -n -w1 72.52.206.134 80

Launch an attack on a server sending 80 separate packets in a short period of time

Identify if a server is running a service using port 80 and is reachable

Use Netcat to remotely administer the server

Use Netcat to start an RDP session on the server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DLL Side-Loading concerns a legitimate process loading a .dll that is located at ...

The same path as the executable

The system directory

The directories that are listed in the PATH environment variable

The Windows directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?

Network-based

Signature-based

Heuristic-based

Anomaly-based

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique does the following cmdline correspond to: query user

RDP Hijacking

Kerberoasting

NTLM Hash Dump

DNS Poisoning