9 Questions
What Google dork operator would you use to only get results that show file extensions?
filetype
In the cyber kill chain, at which stage are you if you are creating a client-side backdoor to send it to the employees via email?
Weaponization
What advanced operator would allow a penetration tester to restrict the search to an organization’s web domain in Google search?
[site:]
Which attack technique involves gaining unauthorized access to a target network, remaining undetected for a long time, and obtaining sensitive information without sabotaging the organization?
Advanced Persistent Threat (APT)
What type of cloud attack did Alice perform in the scenario?
Man-in-the-cloud (MITC) attack
What type of vulnerability assessment was performed by Johnson in the scenario?
Host-based assessment
What service is running on port 389 according to the audit report?
LDAP, and you must change it to 636, which is LDAPS
What type of attack did Richard perform in the scenario?
Replay attack
What protocol does Garry use to manage networked devices from a remote location?
SNMP
Test your knowledge on Google dorks for website footprinting and client-side backdoors for user awareness testing. Learn about advanced techniques for penetration testing and social engineering.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free