Setup a Stealthy Command and Control Center Online

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary method used to bypass firewall restrictions in the initial setup?
Bypassing through SSH
Utilizing FTP traffic
Exploiting DNS traffic on port 53
Using HTTP traffic
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended strategy to mitigate DNS vulnerabilities?
Allow all DNS traffic
Block all external DNS servers
Ensure internal DNS servers only communicate with authorized external DNS servers
Use a VPN for all DNS queries
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which service providers are mentioned for setting up a cloud server?
Heroku and Linode
AWS and Azure
Google Cloud and IBM Cloud
VPS Cheap and Digital Ocean
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What software needs to be installed on the Windows Server to set up the malicious server?
Python
Ruby
Java
Node.js
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is the connection to the malicious server secured?
Encrypting the session with a secret
Using SSL certificates
Using a VPN
Through a firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used on the client to connect to the server?
DNS Cat command with server IP, port, and secret
FTP command with server IP
SSH command with server IP
HTTP request to server IP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of updating the nameservers of a domain in this context?
To change the hosting provider
To enhance security
To point the domain to a malicious server
To improve website speed
Similar Resources on Wayground
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Cloning Any Webpage

Interactive video
•
University
6 questions
How to use the dig command: 2-Minute Linux Tips

Interactive video
•
University
6 questions
Backdoor Tools Explained

Interactive video
•
University
6 questions
Wireshark D5 V4 - HTTP analysisDHCP analysis

Interactive video
•
University
8 questions
Linux Fundamentals - Exploring IP Address Settings

Interactive video
•
University
4 questions
DNS Poisoning Attack

Interactive video
•
University
2 questions
Linux Operating System: A Complete Linux Guide for Beginners - Setting Up Your Own Webpage

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University