Volume 2

Volume 2

Professional Development

29 Qs

quiz-placeholder

Similar activities

Openstack

Openstack

Professional Development

25 Qs

IT support technician level-1 (MS. Word)

IT support technician level-1 (MS. Word)

Professional Development

25 Qs

Web Application Development (WAD)

Web Application Development (WAD)

Professional Development

25 Qs

Net+ Chapter 16 - Mobile Networking

Net+ Chapter 16 - Mobile Networking

Professional Development

24 Qs

VIDEO GAMES

VIDEO GAMES

KG - Professional Development

26 Qs

THE BLACK QUIZ

THE BLACK QUIZ

Professional Development

24 Qs

A+ - 16C - Configure SOHO Router Security

A+ - 16C - Configure SOHO Router Security

Professional Development

24 Qs

İnformatika Qəbul DİM 1

İnformatika Qəbul DİM 1

Professional Development

25 Qs

Volume 2

Volume 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Sweden Garcia

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which TCP flag indicates that a connection should be torn down abruptly?

Responses?

ACK

URG

FIN

RST

Answer explanation

Six control bits describe the packet's role in the connection:

SYN: Synchronize

ACK: Acknowledgment

FIN: End a connection

RST: Tear down a connection

URG: Urgent data are included

PSH: Data should be pushed through the TCP stack

2.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which of the following is a challenge of working with OSINT data?

Responses?

Using bitcoin to pay for access to data services

Properly decrypting various data sources

Converting different HTML and XML versions

Collecting from numerous and disparate data sources

Answer explanation

The primary problem with OSINT data collection is the number of unique data sources, each providing disparate data from varied search criteria. Many OSINT data services are free, but some require registration prior to use. Other OSINT data services require payment, sometimes charged as a price per search, a subscription model, a one-time cost, or one of many other variations.

3.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

What is the following Google search designed to do?

wireless site:somecompany.net

Search for all instances of the term "wireless" on the somecompany.net website

Find pages similar to somecompany.net that also mention the term "wireless"

Display all pages containing both the terms "somecompany.net" and "wireless site"

Display all pages with the term "wireless" in them that link to somecompany.net

Answer explanation

The site: directive allows an attacker to search for pages on just a single site or domain, narrowing down and focusing the search. The search "wireless site:somecompany.net" produces a search result for the term "wireless" limited to the site somecompany.net.

4.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

When interrogating a DNS server to discover information about the target domain, what tool can be used in controlling the output of DNS queries with more granularity?

dnsstuff

Dig

mxtoolbox

dnsquery

Answer explanation

The two primary tools to interrogate DNS servers are nslookup and Dig. Nslookup is available by default on Windows systems and some UNIX platforms. Dig is arguably a more powerful tool since you can control the output of DNS queries with more granularity than with nslookup. Windows users can install the BIND software that includes Dig, allowing you to run Dig on Windows systems as well.

5.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

DeepBlueCLI is an open-source framework that automatically parses Windows event logs. What log does DeepBlueCLI parse when you run it with no arguments?

.\DeepBlue.ps1

PowerShell Event Log

Security Event Log

Application Event Log

System Event Log

Answer explanation

When at a PowerShell prompt as an Administrator and run .\DeepBlue.ps1 without any arguments, the security log will be read.

6.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

When performing reconnaissance, what data is collected before sending any packets to the target?

Open ingress ports

A network diagram

Open egress ports

Open-source intelligence

Answer explanation

Before sending the first packet to a target, a modern attacker will harvest open-source intelligence (OSINT) information. OSINT refers to the cumulative data available about a target online, whether that is a target organization, target person, or other entity.

7.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which tool can detect attacks by analyzing offline Windows event log files?

DeepBlueCLI

Metasploit Log Analyzer

SRUM-Dump

PowerShell Empire

Answer explanation

DeepBlueCLI can detect multiple attacks, including several Metasploit exploits, Mimikatz, PowerShell Empire, password guessing, and password spraying. It can be used to analyze offline log files as well as event logs on the local system or a system on the Windows domain network.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?