Cybersecurity Quiz – Hard

Welcome to your Cybersecurity Quiz - Hard

Which technique allows an attacker to maintain persistence by injecting malicious code into a legitimate running process?

Which hashing algorithm is most vulnerable to length extension attacks?

Which attack abuses speculative execution vulnerabilities in modern CPUs?

What is the primary purpose of an X.509 certificate’s CRL?

In Kerberos which ticket is used to request access to a specific service?

Which encryption mode provides confidentiality but not message integrity?

What does a pass-the-hash attack exploit?

Which tool is most commonly used for kernel rootkit detection?

Which technique is used to covertly exfiltrate data via DNS queries?

In digital forensics

what does the “order of volatility” define?

Which attack abuses weak integrity in WPA2’s 4-way handshake?

What is a characteristic of ECC over RSA?

Which payload technique allows execution even when DEP is enabled?

What is the primary defense against SSRF attacks?

Which protocol is vulnerable to the “Logjam” downgrade attack?

Which part of memory does ASLR randomize?

Which security model enforces “no read up

no write down”?

In container security

what is a risk of privileged mode?

Which MITRE ATT&CK phase includes credential dumping?

What is the main purpose of HMAC?

Format string injection exploits what?

Which evasion technique targets machine-learning models?

Which log file helps detect SSH brute-force attacks on Linux?

Which browser feature isolates tabs into separate processes?

What does the term “Golden Ticket Attack” refer to?

Leave a Reply

Your email address will not be published. Required fields are marked *