Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

University

21 Qs

quiz-placeholder

Similar activities

Linux Talan Inside Quiz

Linux Talan Inside Quiz

University - Professional Development

20 Qs

PUR301 Final Revision

PUR301 Final Revision

University

18 Qs

AWS Cloud Concepts Challenge

AWS Cloud Concepts Challenge

University

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

TechnoFuzzle

TechnoFuzzle

University

20 Qs

Comp 2 Module 1

Comp 2 Module 1

University

23 Qs

Module 4B. Post-Exploitation - Linux Privilege Escalation

Module 4B. Post-Exploitation - Linux Privilege Escalation

University

22 Qs

Comandos Linux

Comandos Linux

University

19 Qs

Module 4A. Post-Exploitation - Linux Local Enumeration

Module 4A. Post-Exploitation - Linux Local Enumeration

Assessment

Quiz

Computers

University

Hard

Created by

Sebastian Zamorano

Used 16+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is NOT one of the main goals of post exploitation?
Local Enumeration
Persistence
Privilege Escalation

Remote Code Execution

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to increase the level of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to create a reliable connection that can be recovered during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to remove the evidence of access during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following concepts is related to get information of the exploited system during post exploitation?
Persistence
Privilege Escalation
Local Enumeration
Obfuscation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which valuable information can we get by enumerating the hostname of an exploited machine?
It's users
It's role on the organization
It's Operative System
It's difficulty of post exploitation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an unique numerical identifier assigned to each user on a Linux system?
UID
SUID
GID
OS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?