Google Dorks and Client-side Backdoors Quiz
9 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What Google dork operator would you use to only get results that show file extensions?

  • inurl
  • filetype (correct)
  • site
  • ext

In the cyber kill chain, at which stage are you if you are creating a client-side backdoor to send it to the employees via email?

  • Command and control
  • Reconnaissance
  • Exploitation
  • Weaponization (correct)

What advanced operator would allow a penetration tester to restrict the search to an organization’s web domain in Google search?

  • [location:]
  • [link:]
  • [allinurl:]
  • [site:] (correct)

Which attack technique involves gaining unauthorized access to a target network, remaining undetected for a long time, and obtaining sensitive information without sabotaging the organization?

<p>Advanced Persistent Threat (APT) (C)</p> Signup and view all the answers

What type of cloud attack did Alice perform in the scenario?

<p>Man-in-the-cloud (MITC) attack (C)</p> Signup and view all the answers

What type of vulnerability assessment was performed by Johnson in the scenario?

<p>Host-based assessment (D)</p> Signup and view all the answers

What service is running on port 389 according to the audit report?

<p>LDAP, and you must change it to 636, which is LDAPS (B)</p> Signup and view all the answers

What type of attack did Richard perform in the scenario?

<p>Replay attack (A)</p> Signup and view all the answers

What protocol does Garry use to manage networked devices from a remote location?

<p>SNMP (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser