8.3.7 Practice Questions Flashcards

1
Q

Listen to exam instructions
Which of the following is malware that works by stealth to capture information and then sends it to a hacker to gain remote access?answer

Crackers

Spyware

Writable services

ERD Commander

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following do hackers install in systems to allow them to have continued admittance, gather sensitive information, or establish access to resources and operations within the system?

answer

Backdoors

Crackers

cPassword

Kerberos

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers can maintain access to a system in several ways. Which of the following best describes the unsecure file and folder method?

answer

The hacker will have rights to do whatever the admin account can do.

This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.

Services with weak permissions allow anyone to alter the execution of the service.

There is no problem if the path is written within quotation marks and has no spaces.

A

This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Listen to exam instructions
Which of the following system exploitation methods happens by adding a malicious file to a file path that is missing quotation marks and has spaces in it?

answer

Unsecure file and folder permissions

Spyware

Path interception

Writable services

A

Path interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Listen to exam instructions
A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor?

answer

Timestomp

AuditPol

Metasploit

CCleaner

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly