cs 2724 test2 answers
pdf
keyboard_arrow_up
School
University of Texas *
*We aren’t endorsed by this school
Course
1336
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
2
Uploaded by DoctorMusic9293
What is the purpose of Cobalt Strike in cybersecurity?
A) To launch DDoS attacks
B) To perform penetration testing and red teaming
C) To create secure cryptographic protocols
D) To analyze network traffic patterns
Answer: B) To perform penetration testing and red teaming
Which language is primarily used for scripting in Cobalt Strike?
A) Python
B) Ruby
C) PowerShell
D) Java
Answer: C) PowerShell
What is a "beacon" in the context of Cobalt Strike?
A) A type of malware used for data exfiltration
B) A graphical user interface for managing attacks
C) An encrypted communication channel between an implant and the team server
D) A tool for conducting social engineering attacks
Answer: C) An encrypted communication channel between an implant and the team
server
Which feature of Cobalt Strike allows for domain fronting to bypass network restrictions?
A) Beacon
B) Malleable C2
C) Red Team Automation (RTA)
D) Artifact Kit
Answer: B) Malleable C2
What is the purpose of "spear phishing" in the context of Cobalt Strike?
A) To simulate a targeted email attack
B) To conduct reconnaissance on network infrastructure
C) To perform passive information gathering
D) To create custom payloads for exploitation
Answer: A) To simulate a targeted email attack
Which operating systems are supported by Cobalt Strike?
A) Windows and Linux only
B) macOS and Windows only
C) Windows, macOS, and Linux
D) Windows only
Answer: C) Windows, macOS, and Linux
What is the significance of the "Cobalt Strike Script Manager" tool?
A) It is used for automating post-exploitation tasks.
B) It provides a centralized repository for storing exploits.
C) It allows for the customization of Cobalt Strike's behavior.
D) It generates reports on vulnerabilities discovered during testing.
Answer: C) It allows for the customization of Cobalt Strike's behavior.
Which Cobalt Strike feature enables the execution of shell commands on compromised
hosts?
A) Malleable C2
B) Artifact Kit
C) Post-exploitation Modules
D) Beacon Object Files (BOFs)
Answer: C) Post-exploitation Modules
What is the purpose of "Pivot" in Cobalt Strike?
A) To bypass network firewalls and access internal resources
B) To perform automated reconnaissance on a target
C) To escalate privileges on compromised systems
D) To create custom payloads for specific targets
Answer: A) To bypass network firewalls and access internal resources
What is the primary benefit of using Cobalt Strike for red team operations?
A) Real-time monitoring of network traffic
B) Automated exploitation of vulnerabilities
C) Simulating advanced threat actor techniques
D) Generating compliance reports for audits
Answer: C) Simulating advanced threat actor techniques
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help