Unit 5 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which cryptographic technique involves adding a random string of characters to a password before hashing it to defend against rainbow table attacks?

A. Peppering
B. Stretching
C. Padding
D. Salting

2 In the context of Windows password cracking, why is the LM (LAN Manager) hash considered significantly weaker than NTLM?

A. It is salted by default.
B. It supports passwords up to 128 characters.
C. It splits the password into two 7-character chunks.
D. It uses AES encryption.

3 What is the primary purpose of a 'Rainbow Table' in password cracking?

A. To encrypt passwords using a reversible algorithm.
B. To perform an online brute force attack.
C. To offer a time-memory trade-off for faster hash lookup.
D. To salt hashes automatically.

4 Which command is used in Linux to list all users currently on the system?

A. ls /home
B. cat /etc/shadow
C. cat /etc/passwd
D. net user

5 During a system hacking engagement, an attacker gains access to a machine but has limited privileges. The attacker uses a kernel vulnerability to gain root access. What is this process called?

A. Pivoting
B. Vertical Privilege Escalation
C. Lateral Movement
D. Horizontal Privilege Escalation

6 Which of the following is a specific type of attack where a hacker hides malicious code inside a legitimate file or program?

A. Wrappers/Binders
B. Steganography
C. Polymorphism
D. Rootkit

7 In the context of Reverse Engineering, what is the function of a Disassembler?

A. It converts high-level code to machine code.
B. It executes the code step-by-step.
C. It converts machine code into assembly language.
D. It modifies the source code dynamically.

8 Which hexadecimal value represents the NOP (No Operation) instruction in x86 architecture, often used in buffer overflow exploits?

A. 0x90
B. 0x00
C. 0x80
D. 0xFF

9 What is the primary characteristic of a Reverse Shell?

A. It only works over UDP.
B. It requires the victim to have a public IP address.
C. The attacker connects to the victim's listening port.
D. The victim machine initiates a connection back to the attacker's machine.

10 Which tool is commonly used to extract passwords and hashes from memory (LSASS) on a Windows system?

A. John the Ripper
B. Mimikatz
C. Wireshark
D. Nmap

11 In Linux Privilege Escalation, what does the SUID bit allow?

A. It allows the file to run automatically at startup.
B. It prevents the file from being deleted.
C. It allows a user to execute a file with the permissions of the file owner.
D. It makes the file hidden.

12 Which Windows command is used to manipulate file attributes to hide files as part of maintaining persistence?

A. attrib +h file.txt
B. chmod +h file.txt
C. hide file.txt
D. chown hidden file.txt

13 What is DLL Hijacking?

A. Injecting code into a running process.
B. Deleting system DLLs to cause a crash.
C. Replacing a legitimate DLL with a malicious one in a directory searched by the application.
D. Decrypting a DLL file.

14 Which type of rootkit operates at the same privilege level as the Operating System kernel (Ring 0)?

A. User-mode Rootkit
B. Kernel-mode Rootkit
C. Application-level Rootkit
D. Library-level Rootkit

15 Which Python library is most frequently used for network interaction and crafting custom packets in scripting exploits?

A. Scapy
B. Pandas
C. Matplotlib
D. NumPy

16 When analyzing exploit code, what is the purpose of the payload?

A. To find the vulnerability.
B. To encrypt the connection.
C. The code that runs on the target system after exploitation.
D. To crash the service.

17 What is the specific vulnerability related to 'Unquoted Service Paths' in Windows?

A. Services that cannot be stopped.
B. Services running as LocalSystem.
C. Paths containing spaces not enclosed in quotes allow execution of arbitrary executables.
D. Services running without a password.

18 Which Linux command helps identify commands a user can run as another user (often root) without a password?

A. sudo -l
B. whoami
C. su root
D. cat /etc/sudoers

19 What does the technique Steganography entail?

A. Flooding a server with requests.
B. Cracking passwords using GPU.
C. Intercepting network traffic.
D. Hiding data within another file, such as an image or audio file.

20 Which Metasploit payload executes a payload within the memory of the compromised process without writing to the disk?

A. Bind Shell
B. Command Shell
C. VNC Inject
D. Meterpreter

21 In a brute-force attack, if the password length is and the character set size is , what is the complexity of the attack?

A.
B.
C.
D.

22 Which registry key is commonly targeted for maintaining persistence on Windows so that malware runs on user login?

A. HKLM\SAM\SAM
B. HKLM\Software\Microsoft\Windows\CurrentVersion\Run
C. HKLM\System\CurrentControlSet\Services
D. HKCU\Control Panel\Desktop

23 What is NTFS Data Hiding using Alternate Data Streams (ADS)?

A. Deleting the file allocation table.
B. Moving files to a hidden partition.
C. Hiding a file inside another file's metadata stream on NTFS filesystems.
D. Encrypting the hard drive.

24 Which of the following tools is a popular open-source reverse engineering framework developed by the NSA?

A. Radare2
B. IDA Pro
C. OllyDbg
D. Ghidra

25 What is Dirty COW (CVE-2016-5195)?

A. A Windows SMB exploit.
B. A Linux kernel privilege escalation vulnerability.
C. A password cracking tool.
D. A method for SQL injection.

26 In the context of scripting for pen-testing, what is Bash primarily used for?

A. Reverse engineering binaries.
B. Windows kernel exploitation.
C. Developing web applications.
D. Automating tasks in Unix/Linux environments.

27 Which attack involves capturing the NTLM hash of a user and using it to authenticate without cracking the password?

A. Golden Ticket
B. Brute Force
C. Dictionary Attack
D. Pass the Hash

28 What is the purpose of timestomping in post-exploitation?

A. Slowing down the CPU to evade detection.
B. Modifying file timestamps (access, modify, create) to hide malicious activity.
C. Crashing the system time service.
D. Scheduling tasks for the future.

29 Which command allows you to view the currently loaded modules and their memory addresses in a Windows debugging environment like OllyDbg?

A. Call Stack
B. CPU Registers
C. Executable Modules
D. Memory Map

30 What does the command chmod 4755 filename do in Linux?

A. Sets the SUID bit on the file.
B. Hides the file.
C. Sets the file to read-only.
D. Deletes the file.

31 Which tool is primarily designed for performing online password attacks against network services (FTP, SSH, Telnet)?

A. John the Ripper
B. Hydra
C. Ophcrack
D. Hashcat

32 In a Buffer Overflow attack, the attacker attempts to overwrite the EIP register. What does EIP stand for?

A. Extended Internal Process
B. Extended Immediate Pointer
C. Extended Instruction Pointer
D. Extended Index Pointer

33 Which of the following is a method of covering tracks on a Windows system?

A. Using wevtutil cl to clear event logs.
B. Creating a new user.
C. Running whoami.
D. Running ipconfig.

34 What is the primary function of a Keylogger?

A. To log network traffic.
B. To encrypt user files.
C. To log into the system automatically.
D. To record every keystroke made by the user.

35 Which Windows feature can be exploited by pressing the SHIFT key 5 times?

A. Toggle Keys
B. Sticky Keys
C. Mouse Keys
D. Filter Keys

36 What is the purpose of Pivoting in penetration testing?

A. Switching from Linux to Windows.
B. Changing the password frequently.
C. Using a compromised system to attack other systems in the same network.
D. Rotating the screen display.

37 Which PowerShell command is used to download a file from a remote server?

A. Download-File
B. Get-File
C. wget
D. Invoke-WebRequest

38 Which component of the Metasploit Framework stores information about targets, loot, and collected data?

A. msfvenom
B. msfconsole
C. Meterpreter
D. The Database (PostgreSQL)

39 What distinguishes Static Analysis from Dynamic Analysis in malware analysis?

A. Static analysis examines code without execution; dynamic analysis observes code behavior during execution.
B. Static analysis is for Linux; dynamic analysis is for Windows.
C. Static analysis runs the code; dynamic analysis does not.
D. Static analysis uses debuggers; dynamic analysis uses disassemblers.

40 Which script allows an attacker to automate the search for privilege escalation vectors on a Linux system?

A. BloodHound
B. WinPEAS
C. PowerView
D. LinPEAS

41 What is a Logic Bomb?

A. A DoS attack tool.
B. Code intentionally inserted into a software system that sets off a malicious function when specified conditions are met.
C. Malware that explodes the hardware.
D. A script that brute forces logical ports.

42 In the context of enumerating assets, what information does SNMP (Simple Network Management Protocol) primarily provide if misconfigured (public community string)?

A. Encrypted passwords.
B. Firewall rules.
C. Network statistics, system information, and user accounts.
D. Web application source code.

43 Which type of shellcode is typically used when the target system is behind a firewall that blocks incoming connections?

A. Null TCP
B. Bind TCP
C. Loopback TCP
D. Reverse TCP

44 What is the SAM file in Windows?

A. Secure Access Module
B. Security Account Manager
C. System Admin Manager
D. System Access Method

45 Which of the following describes a Dictionary Attack?

A. Capturing the handshake and decrypting it.
B. Using a rainbow table.
C. Using a pre-defined list of likely passwords.
D. Trying every possible combination of characters.

46 When creating a persistent backdoor using Windows Scheduled Tasks, which command is used?

A. taskmgr
B. schtasks
C. cron
D. at (deprecated)

47 What is the main purpose of Ruby in the context of the Metasploit Framework?

A. It is used for database management.
B. It is used for network scanning only.
C. It is the GUI framework.
D. It is the language used to write Metasploit modules.

48 Which vulnerability allows an attacker to escalate privileges by exploiting a program that runs with higher privileges but insecurely loads libraries from the current directory?

A. SQL Injection
B. Buffer Overflow
C. XSS
D. DLL Hijacking

49 What does the Sticky Bit do on a directory in Linux?

A. It makes files executable.
B. It keeps files in memory.
C. It prevents users from deleting files they do not own.
D. It shares files with everyone.

50 Which tool allows for the creation of custom wordlists based on the content of a target website?

A. CeWL
B. Netcat
C. Nmap
D. Wireshark