Welcome to your Cybersecurity Quiz - Hard
Which technique allows an attacker to maintain persistence by injecting malicious code into a legitimate running process?
Which hashing algorithm is most vulnerable to length extension attacks?
Which attack abuses speculative execution vulnerabilities in modern CPUs?
What is the primary purpose of an X.509 certificate’s CRL?
In Kerberos which ticket is used to request access to a specific service?
Hint
Which encryption mode provides confidentiality but not message integrity?
What does a pass-the-hash attack exploit?
Which tool is most commonly used for kernel rootkit detection?
Which technique is used to covertly exfiltrate data via DNS queries?
In digital forensics
what does the “order of volatility” define?
Hint
Which attack abuses weak integrity in WPA2’s 4-way handshake?
What is a characteristic of ECC over RSA?
Which payload technique allows execution even when DEP is enabled?
What is the primary defense against SSRF attacks?
Which protocol is vulnerable to the “Logjam” downgrade attack?
Which part of memory does ASLR randomize?
Which security model enforces “no read up
Hint
In container security
what is a risk of privileged mode?
Hint
Which MITRE ATT&CK phase includes credential dumping?
What is the main purpose of HMAC?
Format string injection exploits what?
Which evasion technique targets machine-learning models?
Which log file helps detect SSH brute-force attacks on Linux?
Which browser feature isolates tabs into separate processes?
What does the term “Golden Ticket Attack” refer to?