
Setup a Stealthy Command and Control Center Online
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary method used to bypass firewall restrictions in the initial setup?
Bypassing through SSH
Utilizing FTP traffic
Exploiting DNS traffic on port 53
Using HTTP traffic
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended strategy to mitigate DNS vulnerabilities?
Allow all DNS traffic
Block all external DNS servers
Ensure internal DNS servers only communicate with authorized external DNS servers
Use a VPN for all DNS queries
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which service providers are mentioned for setting up a cloud server?
Heroku and Linode
AWS and Azure
Google Cloud and IBM Cloud
VPS Cheap and Digital Ocean
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What software needs to be installed on the Windows Server to set up the malicious server?
Python
Ruby
Java
Node.js
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is the connection to the malicious server secured?
Encrypting the session with a secret
Using SSL certificates
Using a VPN
Through a firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used on the client to connect to the server?
DNS Cat command with server IP, port, and secret
FTP command with server IP
SSH command with server IP
HTTP request to server IP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of updating the nameservers of a domain in this context?
To change the hosting provider
To enhance security
To point the domain to a malicious server
To improve website speed
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?