Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

University

21 Qs

quiz-placeholder

Similar activities

IT Essential Chapter 5 Windows Installations

IT Essential Chapter 5 Windows Installations

University

20 Qs

VIQ

VIQ

University

26 Qs

Normas e Padroes de Seguranca - Quiz 1

Normas e Padroes de Seguranca - Quiz 1

University

20 Qs

IY3D607 - Users and Advanced Enumeration

IY3D607 - Users and Advanced Enumeration

University

20 Qs

Properties in Swift coding

Properties in Swift coding

University

18 Qs

Linux Tech Tips

Linux Tech Tips

University

26 Qs

Test Your Knowledge Google Drive

Test Your Knowledge Google Drive

9th Grade - University

20 Qs

QUIZ 4 Mobile App Development Quiz

QUIZ 4 Mobile App Development Quiz

University

20 Qs

Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

Assessment

Quiz

Computers

University

Hard

Created by

Sebastian Zamorano

Used 16+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is NOT one of the main goals of post exploitation?
Local Enumeration
Persistence
Privilege Escalation

Remote Code Execution

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to increase the level of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to create a reliable connection that can be recovered during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to remove the evidence of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to get information of the exploited system during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which valuable information can we get by enumerating the hostname of an exploited machine?
It's users
It's role on the organization
It's Operative System
It's difficulty of post exploitation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an unique numerical identifier assigned to each user on a Linux system?
UID
SUID
GID
OS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?