Network Security Fundamentals Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of redirectors in cyber attacks?

  • To enhance data encryption techniques
  • To strengthen network security controls
  • To prevent exfiltration of data
  • To bypass network defenses and evade detection (correct)

How do tunneling techniques help threat actors?

  • Strengthen network monitoring capabilities
  • Improve network latency issues
  • Enhance data integrity during transmission
  • Encapsulate one protocol within another to bypass security controls (correct)

What is the primary function of SPF and DKIM for email authentication?

  • Allow domain owners to publish policies in DNS (correct)
  • Control access to email attachments
  • Encrypt email content for privacy protection
  • Ensure secure email transmission between servers

Why is checking your purchased domain's reputation essential for network security?

<p>To monitor if the domain is associated with malicious activities (D)</p> Signup and view all the answers

How do threat actors use redirectors to maintain persistence on compromised systems?

<p>By redirecting traffic to a malicious domain controlled by the attacker (A)</p> Signup and view all the answers

What is the main purpose of vulnerability scanning in network security?

<p>Identifying and assessing security vulnerabilities in systems or networks (D)</p> Signup and view all the answers

What is the purpose of the 'FLYOVER' mode in Sn1per reconnaissance tool?

<p>Perform a fast multi-threaded high level scan of multiple targets (C)</p> Signup and view all the answers

Which mode in Sn1per utilises non-intrusive scans to avoid WAF/IPS blocking?

<p>STEALTH (D)</p> Signup and view all the answers

What action does the 'NUKE' mode perform in the Sn1per tool?

<p>Launch full audit of multiple hosts specified in a text file (D)</p> Signup and view all the answers

In which mode does Sn1per quickly enumerate open ports/services on multiple hosts and performs basic fingerprinting?

<p>AIRSTRIKE (A)</p> Signup and view all the answers

Which option provides full automatic web application scans to the results in Sn1per?

<p>WEB (D)</p> Signup and view all the answers

What is the purpose of the 'MASSPORTSCAN' mode in Sn1per?

<p>Performs full detailed port scan on multiple targets specified via switch (B)</p> Signup and view all the answers

What is the purpose of using a DNS response of 0.0.0.0 in Cobalt Strike?

<p>To evade detection and hide the traffic generated by the tool for DNS resolution and evasion (C)</p> Signup and view all the answers

What is the main purpose of Metasploit Framework?

<p>Developing, testing, and executing exploit code against remote target systems (A)</p> Signup and view all the answers

Which type of module in Metasploit Framework is used to perform tasks like scanning networks for vulnerable systems?

<p>Auxiliary modules (C)</p> Signup and view all the answers

What do payload modules in the Metasploit Framework do?

<p>Execute code on the target system (D)</p> Signup and view all the answers

During a penetration test, which type of module in Metasploit Framework is used to take advantage of vulnerabilities in target systems?

<p>Exploit modules (A)</p> Signup and view all the answers

How can security professionals use the Metasploit Framework for security testing activities?

<p>To simulate attacks and test the security of computer systems and networks (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser