IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerA threat actor has compromised a VM in a cloud environment that shares the same physical hardware as non-compromised VMs. Which cloud technology attack method could now be used to exfiltrate credentials, cryptographic keys, and other sensitive information?ITExamAnswers asked 9 months ago • Ethical HackerWhat is a common cause of data breaches in attacks against misconfigured cloud assets?ITExamAnswers asked 9 months ago • Ethical HackerWhich cloud technology attack method would require the threat actor to create a malicious application and install it into a SaaS, PaaS, or IaaS environment?ITExamAnswers asked 9 months ago • Ethical HackerWhich cloud technology attack method could generate crafted packets to cause a cloud application to crash?ITExamAnswers asked 9 months ago • Ethical HackerWhich tool could be used to find vulnerabilities that could lead to metadata service attacks?ITExamAnswers asked 9 months ago • Ethical HackerWhich cloud technology attack method could a threat actor use to access a user or application account that allows access to more accounts and information?ITExamAnswers asked 9 months ago • Ethical HackerWhich term describes when a lower-privileged user accesses functions reserved for higher-privileged users?ITExamAnswers asked 9 months ago • Ethical HackerWhich cloud technology attack method could exploit a bug in a software application to gain access to resources that normally would not be accessible to a user?ITExamAnswers asked 9 months ago • Ethical HackerWhich cloud technology attack method involves breaching the infrastructure to gather and steal information such as valid usernames, passwords, tokens, and PINs?ITExamAnswers asked 9 months ago • Ethical HackerWhich term is an essential characteristic of cloud computing as defined in NIST SP 800-145?ITExamAnswers asked 9 months ago • Ethical HackerWhich two commands are the same in Meterpreter and Linux or Unix-based systems? (Choose two.)ITExamAnswers asked 9 months ago • Ethical HackerAfter the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?ITExamAnswers asked 9 months ago • Ethical HackerWhich two C2 utilities are Python-based? (Choose two.)ITExamAnswers asked 9 months ago • Ethical HackerWhich C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel?ITExamAnswers asked 9 months ago • Ethical HackerA cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should be used?ITExamAnswers asked 9 months ago • Ethical Hacker