Question
A _____ is the one who gains access to systems with a view to fixing identified weaknesses a. Black hat hacker b. Gray hat hacker
- A _____ is the one who gains access to systems with a view to fixing identified weaknesses
a. Black hat hacker
b. Gray hat hacker
c.Script kiddies
d. White hat hacker
- In victim machine 1, after getting the ssh login, which command was used to get the version of the operating system of the victim machine
a. id
b. uname -a
c. searchsploit
d. whoami
- The -O switch in the Nmap commands you ran in this lab (for example, nmap -O -v 10.20.100.50) instructed Nmap to
a. Detect the service of the machine
b. Detect the operating system of the machine
- You run the following command nmap -p21,80,443 -sV -O 45.33.32.156 What is the most likely partial output?
a. The host is up (0.029s latency), Not shown: 992 closed ports PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
80/tcp open http
135/tcp filtered msrpc
443/tcp filtered https
b. The host is up (0.029s latency), PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp filtered https
c. The host is up (0.029s latency). PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp filtered https
Device type: general purpose|firewall|router|broadband router|WAP|terminal
Running: Linux 3.X|2.6.X|2.4.X Network Distance: 12 hops
d. The host is up (0.029s latency). PORT STATE SERVICE
21/tcp closed ftp
80/tcp open http
443/tcp filtered https
- While solving Victim Machine 1, which command was used to show the current user.
a. who
b. whoami
c. Lsgroup
d. Id
- The ____ is an ultimate archive of exploits and vulnerable software. This was used to search for a suitable exploit for privilege escalation in Victim Machine 1.
a. Exploit Database (exploitdb)
b. Metasploit
c. Rapid 7
d. Maltego
- Which statement is true about bind shells:
a. A bind shell instructs the target machine to open a shell command and listen on a local port
b. A bind shell actively pushes a connection back to the attack machine rather than waiting for an incoming connection
c. A bind shell is a shell session established on a connection that is initiated from a remote machine, not from the localhost
d. Attackers who successfully exploit a remote command execution vulnerability can use a bind shell to obtain an interactive shell session on the target machine and continue their attack
- You are asked to start an apache2 service. What would be the correct the command for it?
a. service apache2 start
b. apache2 service start
c. service start apache2
d. start service apache2
- You want to open an ftp connection as a user named john on 192.168.37.198. What would be the correct command do
a. ftp john@192.168.37.198
b. john@192.168.37.198 ftp
c. 192.168.37.198@john ftp
- You want to determine which hosts are reachable on a network and one of the below bash script will help you scan the local network that sends ICMP messages to remote systems to see if they respond. Select the correct answer
a. Ifconfig
b. Arp-scan
c. Ping
d. Netdiscover
Step by Step Solution
There are 3 Steps involved in it
Step: 1

Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2

Step: 3

Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started