1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the primary goal of system hacking in ethical hacking?
a. Exploiting vulnerabilities
b. Gaining unauthorized access to systems
c. Conducting social engineering attacks
d. Performing malware analysis
b. Gaining unauthorized access to systems
Which tool is commonly used for privilege escalation in Windows systems?
a. John the Ripper
b. Windows Exploit Suggester
c. Hashcat
d. Nikto
b. Windows Exploit Suggester
What is the purpose of the SAM file in Windows?
a. Stores user activity logs
b. Stores password hashes for user accounts
c. Manages system configuration
d. Serves as a backup directory
b. Stores password hashes for user accounts
Name a tool that can extract password hashes from the SAM file.
a. Cain & Abel
b. PwDump
c. Mimikatz
d. Netcat
b. PwDump
Which password-cracking tool supports GPU acceleration?
a. Hydra
b. John the Ripper
c. Hashcat
d. Recuva
c. Hashcat
What is the difference between a rootkit and a Trojan?
a. Rootkits exploit web vulnerabilities; Trojans steal passwords
b. Rootkits hide malicious activities; Trojans disguise malicious software as legitimate
c. Rootkits perform privilege escalation; Trojans spread viruses
d. Rootkits target file systems; Trojans target operating systems
b. Rootkits hide malicious activities; Trojans disguise malicious software as legitimate
Which tool is known as the “Swiss Army knife” of networking?
a. Netcat
b. Nikto
c. Wireshark
d. Metasploit
a. Netcat
What is the main purpose of steganography in system hacking?
a. Encrypting sensitive files
b. Hiding data within other files
c. Cracking password hashes
d. Monitoring network traffic
b. Hiding data within other files
Name a common tool used to analyze processes running on Windows systems.
a. Process Explorer
b. CoverMyTracks
c. Recuva
d. Hydra
a. Process Explorer
What is the function of Mimikatz in system hacking?
a. Captures network packets
b. Extracts plaintext credentials and hashes from memory
c. Scans for open ports
d. Deletes user activity logs
b. Extracts plaintext credentials and hashes from memory
Which command lists active network connections on a system?
a. ls
b. net user
c. netstat
d. ifconfig
c. netstat
What is the purpose of a reverse shell?
a. To list active services
b. To connect back to a compromised system
c. To capture user credentials
d. To detect vulnerabilities in a network
b. To connect back to a compromised system
Name a tool used to automate the deletion of attack traces on a compromised system.
a. CoverMyTracks
b. Nikto
c. Metasploit
d. Hashcat
a. CoverMyTracks
How does John the Ripper differ from Hydra?
a. John the Ripper is used for brute-force attacks; Hydra is for offline cracking
b. John the Ripper is for offline cracking; Hydra performs brute-force attacks on services
c. Both are used for network traffic analysis
d. Both are used for exploiting web vulnerabilities
b. John the Ripper is for offline cracking; Hydra performs brute-force attacks on services
Which tool can identify vulnerabilities for privilege escalation in Linux?
a. Windows Exploit Suggester
b. Linux Exploit Suggester
c. Nikto
d. Wireshark
b. Linux Exploit Suggester
What is the significance of the “Administrator” account in system hacking?
a. It is a high-privilege account targeted for complete control
b. It stores user credentials for all accounts
c. It logs system errors and warnings
d. It manages network traffic analysis
a. It is a high-privilege account targeted for complete control
Which Metasploit module is commonly used to create a persistent backdoor?
a. Auxiliaries
b. Exploits
c. Post-Exploitation Persistence
d. Payloads
c. Post-Exploitation Persistence
What type of vulnerabilities does the tool Cain & Abel target?
a. Web server misconfigurations
b. Network password recovery and ARP poisoning
c. SMB share enumeration
d. DNS spoofing attacks
b. Network password recovery and ARP poisoning
How can a rootkit evade detection on a compromised system?
a. By encrypting malicious files
b. By operating at the kernel level
c. By scanning for antivirus programs
d. By exploiting weak passwords
b. By operating at the kernel level
Name a common method used to maintain access to a hacked system.
a. Creating a reverse shell
b. Installing a rootkit
c. Adding backdoors or user accounts
d. Exploiting zero-day vulnerabilities
c. Adding backdoors or user accounts
Which tool is used to recover deleted files on a Windows system?
a. Recuva
b. CoverMyTracks
c. Process Explorer
d. Nikto
a. Recuva
What is the primary use of the Netstat command in system hacking?
a. To analyze active connections for suspicious activity
b. To scan for vulnerabilities
c. To enumerate user accounts
d. To retrieve password hashes
a. To analyze active connections for suspicious activity
What is the function of CoverMyTracks in ethical hacking?
a. Scans for open ports
b. Automates the clearing of logs and traces
c. Identifies weak credentials
d. Monitors running processes
b. Automates the clearing of logs and traces
Name a tool used to crack password hashes offline.
a. Hydra
b. Metasploit
c. Hashcat
d. Wireshark
c. Hashcat
How does Hashcat improve the efficiency of password cracking?
a. By running on low-power devices
b. By utilizing GPU acceleration
c. By combining multiple cracking techniques
d. By targeting dictionary-based attacks only
b. By utilizing GPU acceleration