What is the primary goal of a DoS attack?
What is the primary goal of a DoS attack? To scan the data on the target server To obtain all addresses in the address book within the server To facilitate…
What is the primary goal of a DoS attack? To scan the data on the target server To obtain all addresses in the address book within the server To facilitate…
What is the purpose of a rootkit? To masquerade as a legitimate program To replicate itself independently of any other programs To deliver advertisements without user consent To gain privileged…
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication Explanation & Hint: The method used to check the integrity of…
Can you identify why each of the following organizations might be interested in your online identity? Internet service providers ==> They may be legally required to share your online information…
Can you identify the cyber attacker type from the following descriptions? Make political statements in order to raise awareness about issues that are important to them ==> Hacktivists Gather intelligence…
Which of the following is a key motivation of a white hat attacker? Taking advantage of any vulnerability for illegal personal gain Fine tuning network devices to improve their performance…
Why might internal security threats cause greater damage to an organization than external security threats? Internal users have better hacking skills Internal users have direct access to the infrastructure devices …
Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers Backup Version control Data encryption File permission settings Two-factor authentication Username ID and…
What are the foundational principles for protecting information systems as outlined in the McCumber Cube? Choose three correct answers Access Integrity Scalability Availability Confidentiality Intervention Explanation & Hint: The McCumber Cube…
Which of the following pieces of information would be classified as personal data? Select three correct answers Social security number Driver license number Date and place of birth Job title…
Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right? Yes No…
An individual user profile on a social network site is an example of an Online identity. Explanation & Hint: An individual user profile on a social network site is an…
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What level of cyber protection…
Which two commands are the same in Meterpreter and Linux or Unix-based systems? (Choose two.) pwd hashdump clearev resource cat Explanation & Hint: The Meterpreter commands that are the same…
After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence? performing ARP scans and ping sweeps…
Which two C2 utilities are Python-based? (Choose two.) TrevorC2 Socat DNSCat2 Wsc2 Twittor Explanation & Hint: C2 utilities are useful software tools. Examples include Twittor, wsc2, DNSCat2, socat, and TrevorC2.…
Which C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel? Socat WMImplant WSC2 TrevorC2 Explanation & Hint: Many different techniques and utilities can be used…
A cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should…
An attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe? reverse shell horizontal…
What is the main advantage of Remote Desktop over Sysinternals? It can upload, execute, and interact with executables on compromised hosts. It can run commands revealing information about running processes,…