cs 2724 test2 answers

pdf

School

University of Texas *

*We aren’t endorsed by this school

Course

1336

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

2

Uploaded by DoctorMusic9293

Report
What is the purpose of Cobalt Strike in cybersecurity? A) To launch DDoS attacks B) To perform penetration testing and red teaming C) To create secure cryptographic protocols D) To analyze network traffic patterns Answer: B) To perform penetration testing and red teaming Which language is primarily used for scripting in Cobalt Strike? A) Python B) Ruby C) PowerShell D) Java Answer: C) PowerShell What is a "beacon" in the context of Cobalt Strike? A) A type of malware used for data exfiltration B) A graphical user interface for managing attacks C) An encrypted communication channel between an implant and the team server D) A tool for conducting social engineering attacks Answer: C) An encrypted communication channel between an implant and the team server Which feature of Cobalt Strike allows for domain fronting to bypass network restrictions? A) Beacon B) Malleable C2 C) Red Team Automation (RTA) D) Artifact Kit Answer: B) Malleable C2 What is the purpose of "spear phishing" in the context of Cobalt Strike? A) To simulate a targeted email attack B) To conduct reconnaissance on network infrastructure C) To perform passive information gathering D) To create custom payloads for exploitation Answer: A) To simulate a targeted email attack Which operating systems are supported by Cobalt Strike? A) Windows and Linux only B) macOS and Windows only C) Windows, macOS, and Linux D) Windows only Answer: C) Windows, macOS, and Linux What is the significance of the "Cobalt Strike Script Manager" tool? A) It is used for automating post-exploitation tasks. B) It provides a centralized repository for storing exploits. C) It allows for the customization of Cobalt Strike's behavior. D) It generates reports on vulnerabilities discovered during testing. Answer: C) It allows for the customization of Cobalt Strike's behavior.
Which Cobalt Strike feature enables the execution of shell commands on compromised hosts? A) Malleable C2 B) Artifact Kit C) Post-exploitation Modules D) Beacon Object Files (BOFs) Answer: C) Post-exploitation Modules What is the purpose of "Pivot" in Cobalt Strike? A) To bypass network firewalls and access internal resources B) To perform automated reconnaissance on a target C) To escalate privileges on compromised systems D) To create custom payloads for specific targets Answer: A) To bypass network firewalls and access internal resources What is the primary benefit of using Cobalt Strike for red team operations? A) Real-time monitoring of network traffic B) Automated exploitation of vulnerabilities C) Simulating advanced threat actor techniques D) Generating compliance reports for audits Answer: C) Simulating advanced threat actor techniques
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help