IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerAn attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the main advantage of Remote Desktop over Sysinternals?ITExamAnswers asked 10 months ago • Ethical HackerWhat procedure should be deployed to protect the network against lateral movement?ITExamAnswers asked 10 months ago • Ethical HackerAfter compromising a system during a penetration testing engagement, all penetration work should be cleaned up, including extra files, system changes, and modified logs. The media sanitation methodology should be discussed with the client and the owner of the affected systems. What document guides media sanitation?ITExamAnswers asked 10 months ago • Ethical HackerWhat task can be accomplished with the steghide tool?ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker wants to allow further connections to a compromised system and maintain persistent access. The attacker uses the Windows system command Enable-PSRemoting -SkipNetworkProfileCheck – Force. What tool is being enabled using this command?ITExamAnswers asked 10 months ago • Ethical HackerWhich three tools are living-off-the-land post-exploitation techniques? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerWhich Sysinternals tool is used by penetration testers to modify Windows registry values and connect a compromised system to another system?ITExamAnswers asked 10 months ago • Ethical HackerWhich utility can be used to write scripts or applications to automate administrative tasks on remote computers and can also be used by malware to perform different activities in a compromised system?ITExamAnswers asked 10 months ago • Ethical HackerWhich resource is a single-page JavaScript web application that can be used to find complex attack paths in Microsoft Azure?ITExamAnswers asked 10 months ago • Ethical HackerWhich resource is an open-source framework that allows rapid deployment of post-exploitation modules, including keyloggers, bind and reverse shells, and adaptable communication to evade detection?ITExamAnswers asked 10 months ago • Ethical HackerWhich living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks?ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of channel is created by a C2 with a system that has been compromised?ITExamAnswers asked 10 months ago • Ethical HackerWhich two resources are C2 utilities? (Choose two.)ITExamAnswers asked 10 months ago • Ethical Hacker