Setup a Stealthy Command and Control Center Online
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary method used to bypass firewall restrictions in the initial setup?
Bypassing through SSH
Utilizing FTP traffic
Exploiting DNS traffic on port 53
Using HTTP traffic
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended strategy to mitigate DNS vulnerabilities?
Allow all DNS traffic
Block all external DNS servers
Ensure internal DNS servers only communicate with authorized external DNS servers
Use a VPN for all DNS queries
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which service providers are mentioned for setting up a cloud server?
Heroku and Linode
AWS and Azure
Google Cloud and IBM Cloud
VPS Cheap and Digital Ocean
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What software needs to be installed on the Windows Server to set up the malicious server?
Python
Ruby
Java
Node.js
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is the connection to the malicious server secured?
Encrypting the session with a secret
Using SSL certificates
Using a VPN
Through a firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used on the client to connect to the server?
DNS Cat command with server IP, port, and secret
FTP command with server IP
SSH command with server IP
HTTP request to server IP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of updating the nameservers of a domain in this context?
To change the hosting provider
To enhance security
To point the domain to a malicious server
To improve website speed
Similar Resources on Wayground
8 questions
The Full Stack Web Development - Server & Redis Client Setup
Interactive video
•
University
8 questions
Joining Heroku and GitHub
Interactive video
•
University
6 questions
Why Are Investors Disappointed With Elon Musk and Tesla?
Interactive video
•
University
6 questions
Design Microservices Architecture with Patterns and Principles - Apache Kafka Benefits
Interactive video
•
University
8 questions
Google Dorks Live Examples
Interactive video
•
University
8 questions
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation
Interactive video
•
University
8 questions
Containerize Spring Boot CRUD App with Docker and Docker Compose - Build Image for Spring Boot
Interactive video
•
University
8 questions
AWS Certified Solutions Architect Associate (SAA-C03) - Cloud Computing Models
Interactive video
•
University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
22 questions
FYS 2024 Midterm Review
Quiz
•
University
20 questions
Physical or Chemical Change/Phases
Quiz
•
8th Grade - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
12 questions
1 Times Tables
Quiz
•
KG - University
20 questions
Disney Trivia
Quiz
•
University
38 questions
Unit 6 Key Terms
Quiz
•
11th Grade - University