Unit 5 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which cryptographic technique involves adding a random string of characters to a password before hashing it to defend against rainbow table attacks?

A. Peppering
B. Salting
C. Padding
D. Stretching

2 In the context of Windows password cracking, why is the LM (LAN Manager) hash considered significantly weaker than NTLM?

A. It uses AES encryption.
B. It splits the password into two 7-character chunks.
C. It is salted by default.
D. It supports passwords up to 128 characters.

3 What is the primary purpose of a 'Rainbow Table' in password cracking?

A. To encrypt passwords using a reversible algorithm.
B. To perform an online brute force attack.
C. To offer a time-memory trade-off for faster hash lookup.
D. To salt hashes automatically.

4 Which command is used in Linux to list all users currently on the system?

A. cat /etc/shadow
B. net user
C. cat /etc/passwd
D. ls /home

5 During a system hacking engagement, an attacker gains access to a machine but has limited privileges. The attacker uses a kernel vulnerability to gain root access. What is this process called?

A. Horizontal Privilege Escalation
B. Vertical Privilege Escalation
C. Lateral Movement
D. Pivoting

6 Which of the following is a specific type of attack where a hacker hides malicious code inside a legitimate file or program?

A. Steganography
B. Wrappers/Binders
C. Polymorphism
D. Rootkit

7 In the context of Reverse Engineering, what is the function of a Disassembler?

A. It converts high-level code to machine code.
B. It converts machine code into assembly language.
C. It executes the code step-by-step.
D. It modifies the source code dynamically.

8 Which hexadecimal value represents the NOP (No Operation) instruction in x86 architecture, often used in buffer overflow exploits?

A. 0x00
B. 0x90
C. 0xFF
D. 0x80

9 What is the primary characteristic of a Reverse Shell?

A. The attacker connects to the victim's listening port.
B. The victim machine initiates a connection back to the attacker's machine.
C. It only works over UDP.
D. It requires the victim to have a public IP address.

10 Which tool is commonly used to extract passwords and hashes from memory (LSASS) on a Windows system?

A. Wireshark
B. Mimikatz
C. Nmap
D. John the Ripper

11 In Linux Privilege Escalation, what does the SUID bit allow?

A. It prevents the file from being deleted.
B. It allows a user to execute a file with the permissions of the file owner.
C. It makes the file hidden.
D. It allows the file to run automatically at startup.

12 Which Windows command is used to manipulate file attributes to hide files as part of maintaining persistence?

A. attrib +h file.txt
B. hide file.txt
C. chown hidden file.txt
D. chmod +h file.txt

13 What is DLL Hijacking?

A. Injecting code into a running process.
B. Replacing a legitimate DLL with a malicious one in a directory searched by the application.
C. Decrypting a DLL file.
D. Deleting system DLLs to cause a crash.

14 Which type of rootkit operates at the same privilege level as the Operating System kernel (Ring 0)?

A. User-mode Rootkit
B. Library-level Rootkit
C. Kernel-mode Rootkit
D. Application-level Rootkit

15 Which Python library is most frequently used for network interaction and crafting custom packets in scripting exploits?

A. Pandas
B. Scapy
C. NumPy
D. Matplotlib

16 When analyzing exploit code, what is the purpose of the payload?

A. To find the vulnerability.
B. To crash the service.
C. The code that runs on the target system after exploitation.
D. To encrypt the connection.

17 What is the specific vulnerability related to 'Unquoted Service Paths' in Windows?

A. Services running without a password.
B. Paths containing spaces not enclosed in quotes allow execution of arbitrary executables.
C. Services that cannot be stopped.
D. Services running as LocalSystem.

18 Which Linux command helps identify commands a user can run as another user (often root) without a password?

A. sudo -l
B. su root
C. cat /etc/sudoers
D. whoami

19 What does the technique Steganography entail?

A. Cracking passwords using GPU.
B. Hiding data within another file, such as an image or audio file.
C. Intercepting network traffic.
D. Flooding a server with requests.

20 Which Metasploit payload executes a payload within the memory of the compromised process without writing to the disk?

A. Meterpreter
B. Bind Shell
C. Command Shell
D. VNC Inject

21 In a brute-force attack, if the password length is and the character set size is , what is the complexity of the attack?

A.
B.
C.
D.

22 Which registry key is commonly targeted for maintaining persistence on Windows so that malware runs on user login?

A. HKLM\Software\Microsoft\Windows\CurrentVersion\Run
B. HKLM\System\CurrentControlSet\Services
C. HKCU\Control Panel\Desktop
D. HKLM\SAM\SAM

23 What is NTFS Data Hiding using Alternate Data Streams (ADS)?

A. Encrypting the hard drive.
B. Hiding a file inside another file's metadata stream on NTFS filesystems.
C. Deleting the file allocation table.
D. Moving files to a hidden partition.

24 Which of the following tools is a popular open-source reverse engineering framework developed by the NSA?

A. IDA Pro
B. Ghidra
C. OllyDbg
D. Radare2

25 What is Dirty COW (CVE-2016-5195)?

A. A Windows SMB exploit.
B. A Linux kernel privilege escalation vulnerability.
C. A password cracking tool.
D. A method for SQL injection.

26 In the context of scripting for pen-testing, what is Bash primarily used for?

A. Windows kernel exploitation.
B. Automating tasks in Unix/Linux environments.
C. Developing web applications.
D. Reverse engineering binaries.

27 Which attack involves capturing the NTLM hash of a user and using it to authenticate without cracking the password?

A. Golden Ticket
B. Pass the Hash
C. Brute Force
D. Dictionary Attack

28 What is the purpose of timestomping in post-exploitation?

A. Slowing down the CPU to evade detection.
B. Modifying file timestamps (access, modify, create) to hide malicious activity.
C. Scheduling tasks for the future.
D. Crashing the system time service.

29 Which command allows you to view the currently loaded modules and their memory addresses in a Windows debugging environment like OllyDbg?

A. Executable Modules
B. Memory Map
C. Call Stack
D. CPU Registers

30 What does the command chmod 4755 filename do in Linux?

A. Sets the file to read-only.
B. Sets the SUID bit on the file.
C. Deletes the file.
D. Hides the file.

31 Which tool is primarily designed for performing online password attacks against network services (FTP, SSH, Telnet)?

A. Hydra
B. John the Ripper
C. Hashcat
D. Ophcrack

32 In a Buffer Overflow attack, the attacker attempts to overwrite the EIP register. What does EIP stand for?

A. Extended Instruction Pointer
B. Extended Index Pointer
C. Extended Internal Process
D. Extended Immediate Pointer

33 Which of the following is a method of covering tracks on a Windows system?

A. Running whoami.
B. Using wevtutil cl to clear event logs.
C. Creating a new user.
D. Running ipconfig.

34 What is the primary function of a Keylogger?

A. To encrypt user files.
B. To record every keystroke made by the user.
C. To log network traffic.
D. To log into the system automatically.

35 Which Windows feature can be exploited by pressing the SHIFT key 5 times?

A. Filter Keys
B. Sticky Keys
C. Mouse Keys
D. Toggle Keys

36 What is the purpose of Pivoting in penetration testing?

A. Rotating the screen display.
B. Using a compromised system to attack other systems in the same network.
C. Changing the password frequently.
D. Switching from Linux to Windows.

37 Which PowerShell command is used to download a file from a remote server?

A. wget
B. Invoke-WebRequest
C. Get-File
D. Download-File

38 Which component of the Metasploit Framework stores information about targets, loot, and collected data?

A. msfvenom
B. msfconsole
C. The Database (PostgreSQL)
D. Meterpreter

39 What distinguishes Static Analysis from Dynamic Analysis in malware analysis?

A. Static analysis runs the code; dynamic analysis does not.
B. Static analysis examines code without execution; dynamic analysis observes code behavior during execution.
C. Static analysis is for Linux; dynamic analysis is for Windows.
D. Static analysis uses debuggers; dynamic analysis uses disassemblers.

40 Which script allows an attacker to automate the search for privilege escalation vectors on a Linux system?

A. WinPEAS
B. LinPEAS
C. PowerView
D. BloodHound

41 What is a Logic Bomb?

A. Malware that explodes the hardware.
B. Code intentionally inserted into a software system that sets off a malicious function when specified conditions are met.
C. A script that brute forces logical ports.
D. A DoS attack tool.

42 In the context of enumerating assets, what information does SNMP (Simple Network Management Protocol) primarily provide if misconfigured (public community string)?

A. Encrypted passwords.
B. Network statistics, system information, and user accounts.
C. Firewall rules.
D. Web application source code.

43 Which type of shellcode is typically used when the target system is behind a firewall that blocks incoming connections?

A. Bind TCP
B. Reverse TCP
C. Null TCP
D. Loopback TCP

44 What is the SAM file in Windows?

A. System Admin Manager
B. Security Account Manager
C. Secure Access Module
D. System Access Method

45 Which of the following describes a Dictionary Attack?

A. Trying every possible combination of characters.
B. Using a pre-defined list of likely passwords.
C. Using a rainbow table.
D. Capturing the handshake and decrypting it.

46 When creating a persistent backdoor using Windows Scheduled Tasks, which command is used?

A. schtasks
B. taskmgr
C. cron
D. at (deprecated)

47 What is the main purpose of Ruby in the context of the Metasploit Framework?

A. It is the language used to write Metasploit modules.
B. It is used for database management.
C. It is the GUI framework.
D. It is used for network scanning only.

48 Which vulnerability allows an attacker to escalate privileges by exploiting a program that runs with higher privileges but insecurely loads libraries from the current directory?

A. Buffer Overflow
B. DLL Hijacking
C. SQL Injection
D. XSS

49 What does the Sticky Bit do on a directory in Linux?

A. It prevents users from deleting files they do not own.
B. It makes files executable.
C. It shares files with everyone.
D. It keeps files in memory.

50 Which tool allows for the creation of custom wordlists based on the content of a target website?

A. CeWL
B. Nmap
C. Netcat
D. Wireshark