IT Questions Bank Which cloud technology attack method involves breaching the infrastructure to gather and steal information such as valid usernames, passwords, tokens, and PINs?ITExamAnswers asked 10 months ago • Ethical HackerWhich term is an essential characteristic of cloud computing as defined in NIST SP 800-145?ITExamAnswers asked 10 months ago • Ethical HackerWhich two commands are the same in Meterpreter and Linux or Unix-based systems? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerAfter the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?ITExamAnswers asked 10 months ago • Ethical HackerWhich two C2 utilities are Python-based? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel?ITExamAnswers asked 10 months ago • Ethical HackerA cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should be used?ITExamAnswers asked 10 months ago • Ethical HackerAn attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the main advantage of Remote Desktop over Sysinternals?ITExamAnswers asked 10 months ago • Ethical HackerWhat procedure should be deployed to protect the network against lateral movement?ITExamAnswers asked 10 months ago • Ethical HackerAfter compromising a system during a penetration testing engagement, all penetration work should be cleaned up, including extra files, system changes, and modified logs. The media sanitation methodology should be discussed with the client and the owner of the affected systems. What document guides media sanitation?ITExamAnswers asked 10 months ago • Ethical HackerWhat task can be accomplished with the steghide tool?ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker wants to allow further connections to a compromised system and maintain persistent access. The attacker uses the Windows system command Enable-PSRemoting -SkipNetworkProfileCheck – Force. What tool is being enabled using this command?ITExamAnswers asked 10 months ago • Ethical HackerWhich three tools are living-off-the-land post-exploitation techniques? (Choose three.)ITExamAnswers asked 10 months ago • Ethical Hacker