Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer q1 to q12 How would you maintain persistence/backdoor a standard Linux Machine? Pick ONE option Run a reverse shell using NetCat Dump the

Please answer q1 to q12

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

How would you maintain persistence/backdoor a standard Linux Machine? Pick ONE option Run a reverse shell using NetCat Dump the password registry with Mimikatz Scan for open ports using NMAP Using the backdoor module that comes with Python 2. Question 2 Which of the following would indicate that someone has set up a backdoor or persistence mechanism on a Linux machine? Pick ONE option Unknown newly installed packages from the public NPM repository. Abnormal egress traffic to an unknown IP address. Unexpected memory and CPU spikes from a cron job for an old python script that enumerates asset inventories. Abnormal authentication logs from a Kubernetes container that hosts a publicly facing application that accepts user input for authentication. Which of the following could be used to prevent a malicious user maintaining a backdoor on a Linux Machine? Pick ONE option Use Ubuntu instead of Red Hat, as it has backdoor protection by default Restricting network ingress and egress rules. Lock down permissions on /etc/shadow. Routine Nessus scans of the instance. Clear Selection 4. Question 4 Given a scenario where a new high severity vulnerability was released how would you determine if you are affected by it? Pick ONE option Use NMAP to scan your infrastructure for vulnerabilities and see if the new CVE shows up in the results. Enumerate systems and installed or running packages and look for matching package names/versions that need to be patched. Find a public exploit of the vulnerability and test it against your production infrastructure. Assume that the automation you have in place for patching is working across all of your infrastructure and report back that you are not affected by the vulnerability. Clear Selection You find what you believe to be a critical vulnerability in the product but want to make sure its exploitable first, do you: Pick ONE option Write an exploit and share it with a friend that you know has access to the product at a different company to see if the code works for them. Write an exploit and launch it against the product internally to see if the security team picks up the activity. Notify the rest of the security team to safely verify in a non-production environment. Move on from the finding to other high priority work without notifying the team because they are currently very busy. 6. Question 6 Which of the following outlines a proper configuration for SSH Key Authentication? Pick ONE option A symmetric key is created by a user and the hash is distributed to Linux machines to give them access. An asymmetric key pair is created and the user keeps the private key on their laptop, while distributing the public key to their Linux infrastructure. An asymmetric key pair is created and the user keeps the public key on their laptop, while distributing the private key to their Linux infrastructure. An asymmetric key pair is created by a user and then they distribute the private key on a jump-box so you can use it as an access point to other Linux servers that have the public key. Clear Selection You have been tasked with standing up an instance in AWS for a project, which option is your best for doing so? Pick ONE option AWS has pre-set launch configurations because they know best security standards for their cloud, and we should use their launch-wizard tools whenever available to stand up infrastructure. Create an instance and an AWS IAM Role with Administrator perms that can access the instance with Assume Role. Use company guidelines or internal tools to stand up an EC2 instance with proper IAM roles that are scoped to the needs of the instance, and Security Groups that allow traffic only to required resources for your project. Create an instance and open up the network interface to the internet so the whole team has easy access to work on it for the project 8. Question 8 While doing the project above, you realize your user does not have permissions to create EC2 instances in AWS. What do you do? Pick ONE option Create an inline policy giving your user permissions to do action: ec2* on resource: * Give your user Administrator while you stand up the resource, but make sure to remember to revert the permissions after work is complete. Create an inline policy with scoped EC2 actions, such as Createlnstance, with only access to resources that you will be working on. Use and existing policy for ec2 permissions from a different role, and add the resources you need to that policies resources block. Which of the following would be the highest priority to implement for authentication on a new service? Pick ONE option Regular Password Rotation Mechanism Blocking of copy/paste functionality on sensitive fields Password Complexity requirements Multi-Factor Authentication 10. Question 10 If you were tasked to go audit the login activity on a Linux machine, which would you go look? Pick ONE option /tmp/log/logd.log /var/log/syslog.log or / var/log/auth.log letc/shadow and .ssh/logs.txt When configuring an AWS security group, which of the is the most permissive? Pick ONE option Configuring ingress for 0.0.0.0/0 on all ports, but restricting Egress to your home IP on any port. Leaving the Ingress and Egress rules empty Configuring both ingress and egress to allow traffic from all ports on 0.0.0.0/0 Restricting Ingress to your home IP address, and Egress to allow traffic on all ports from 0.0.0.0/0 12. Question 12 Which of the following IAM policies is the most restrictive? Pick ONE option { "Effect": "Allow", "Action": "iam: ", "Resource": "*" } \{"Effect": "Allow", "Action": "", "Resource": "arn:aws:iam::123412341234:role/myProject" \} \{"Effect": "Allow", "Action": "ec2:Describe*", "Resource": "arn:aws:iam::123412341234:role/myProject" \} { "Effect": "Allow", "Action": "", "Resource": "" } Clear Selection

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Database Management

Authors: Jeffrey A. Hoffer Fred R. McFadden

9th Edition

B01JXPZ7AK, 9780805360479

More Books

Students also viewed these Databases questions