0 of 40 Questions completed
Questions:
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
0 of 40 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Match the description with the most accurate attack type.
An online scam where a website's traffic is manipulated and confidential information is stolen. In essence, it is the criminal act of producing a fake website and then redirecting users to it
|
|
Attackers seeking entry to a restricted area without proper authentication. In it, the perpetrators can simply follow an authorized person into a restricted location
|
|
A highly targeted phishing attack – aimed at senior executives – masquerading as a legitimate email
|
|
A URL hijacking or a fake URL where threat actors impersonate legitimate domains for malicious purposes such as fraud or malware spreading
|
|
Match the description with the most accurate attack type.
Α type of social engineering attack which is used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity
|
|
An attack that is implemented through text messages or SMS. The criminal executes the attack with the intent to gather personal information, including social insurance and/or credit card numbers
|
|
A phone attack designed to get you to share personal information. The attacker uses social engineering to get you to share personal information and financial details, such as account numbers and passwords
|
|
An email or electronic communications scam targeted towards a specific individual, organization or business
|
|
Fill in the blank with the BEST malware type for the description.
– A type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.
– A type of malware that is often disguised as legitimate software and can be employed by hackers trying to gain access to users’ systems.
– A type of malware that spreads copies of itself from computer to computer.
Match the description with the most accurate malware.
A piece of often-malicious code that is intentionally inserted into the software. It is activated upon the host network only when certain conditions are met
|
|
A malware program that gives an intruder administrative control over a target computer
|
|
A type of malware that allows threat actors to use someone else's computer or server to mine for cryptocurrencies
|
|
A method by which authorized and unauthorized users are able to get around normal security measures and gain root access to a computer system
|
|
Fill in the blank with the BEST password attack for the description.
– An attacker will brute force logins based on a list of usernames with default passwords on the application. For example, an attacker will use one password (say, Secure@123) against many different accounts on the application to avoid account lockouts that would normally occur when brute forcing a single account with many passwords.
– A method of breaking into a password-protected computer, network, or other IT resource by systematically entering every word in a dictionary as a password.
– A type of hacking wherein the perpetrator tries to use a rainbow hash table to crack the passwords stored in a database system.
Match the appropriate authentication reference to each description. Each authentication factor and authentication attribute will be used once.
During the checkout process, you receive an OTP passcode to finalize the purchase
|
|
You enter your passcode to unlock your iPhone
|
|
You use your fingerprint to unlock a door
|
|
Your login will not work unless you are connected to the VPN using the United States as a country
|
|
Configure the following stateful firewall rules:
• Allow the File Server to access the Database Server using LDAP
• Block the Storage Server to transfer files to the Web Server using FTP
• Allow the FTP Server to transfer files to the Mail Server over HTTPS
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Configure the following stateful firewall rules:
• Block the Web Server to access the Database Server using LDAP
• Allow the Storage Server to transfer files to the Web Server using SFTP
• Allow the Mail Server to transfer emails to the Storage Server using SMTP
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Match the appropriate wireless network attack to each description. Each wireless attack will be used once.
An attacker setting up a fraudulent wireless access point that mimics the characteristics of a legitimate AP. Users may connect automatically to the evil twin or do so thinking the fraudulent AP is part of a trusted wifi network
|
|
An attacker gains unauthorized access to a wireless device via a Bluetooth connection. Once the hacker has access to the device, they can steal sensitive user information, including personal photos, contact lists, emails, and passwords
|
|
A hacking method that lets a person send unsolicited messages (typically flirtatious but can also be malicious) to any Bluetooth-enabled device within his own device’s range
|
|
A type of Denial Of Services Attack, which is used to disconnect an access point (mobile device in this case) from a router by sending disassociation packets to the device
|
|
Match the appropriate programming language to each script. Each programming language will be used once.
$tls10 = 'HKLM:\SYSTEM\CurrentCntrSet |
|
string1 = "Dojo" |
|
function greeting() { |
|
Match the cryptographic concepts to the implementation:
A cryptographic value that is calculated from the data and a secret key is known only by the signer
|
|
A parameter of symmetrical or asymmetric encryption processes that provides information on how many different key values a key can accept in a specific protocol
|
|
The addition of random data to a hash function to obtain a unique output, which refers to the hash
|
|
A method of cryptography that converts any form of data into a unique string of text
|
|
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
5.5.5.5 |
20.5.30.40 |
443 |
allow |
2 |
Any |
20.5.30.140 |
25 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Transfer emails from 1.2.3.4 to 20.5.30.140
Request a secured web page on 20.5.30.40 from 5.5.5.5
Perform a DNS query from 10.1.10.88 to 9.9.9.9
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
Any |
53 |
allow |
2 |
Any |
Any |
123 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Synchronize the clock on a server at 99.99.99.4 from 88.88.88.1
Perform a DNS query from 4.5.6.7 to 7.6.5.4
Request an unsecured web page on 20.5.30.140
Request a secured web page on 20.5.30.140
Use SSH connection to connect to 20.5.30.140
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
20.5.30.40 |
22 |
allow |
2 |
Any |
20.5.30.140 |
80 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Use SSH connection to connect to 20.5.30.40
Use SSH connection to connect to 20.5.30.140
Request an unsecured web page on 20.5.30.140
Request a secured web page on 20.5.30.140
Match the device to the description:
A server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online
|
|
A device intelligently distributed within networks that passively inspect traffic traversing the devices on which they sit
|
|
A device that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet
|
|
A way to map multiple local private addresses to a public one before transferring the information
|
|
Match the characteristic to the attack type:
A type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker
|
|
An attack that shuts down a machine or network, making it inaccessible to its intended users
|
|
An attacker impersonates an authorized device or user to steal data, spread malware, or bypass access control systems
|
|
The act of changing the registration of a domain name without the permission of the original owner
|
|
Match the Public key infrastructure (PKI) component to the description:
An entity that issues digital certificates
|
|
A company that is responsible for receiving and validating requests for digital certificates and public/private key pairs
|
|
A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date and should no longer be trusted
|
|
Used by Certificate Authorities to check the revocation status of an X.509 digital certificate
|
|
The first step towards getting your own SSL/TLS certificate.
|
|
Type the command to view the Internet Protocol (IP) configuration on a Linux host.
student@dojolab:~$
You are at a Windows 10 workstation and have a command prompt open. Type the command to view resource record information on a particular DNS server.
C:\>
You are at a Windows 10 workstation and have a command prompt open. Type the command that displays the routing table on the local computer.
C:\>
You need to perform a nmap scan using the hostname server1.dojopass.org to find out all open ports, services and MAC address on that system. Type the command to initiate the scan.
student@dojolab:~$
You are working at a Linux command prompt. You need to find the A record from the website dojopass.org to troubleshoot DNS-related issues. Type the command to display the records from the dojolab DNS server.
student@dojolab:~$
Type the Windows command-line utility that produces the following output.
1 <1 ms <1 ms <1 2 7 ms 3 ms 4 ms 3 45 ms 23 ms 19 ms 4 11 ms 29 ms 28 [202.1.56.23] 5 26 ms 29 ms 29 [199.12.87.26] 6 * * * Request timed out. 7 56 ms 67 ms 99 ms be11.trmc15-01.ars.mgmt.hox1 [156.168.0.3] 8 * * * Request timed out. 9 222 ms 222 ms 198 ms be13.trmc35-01.ars.mgmt.hox37 [164.168.0.4]
C:\>
Type the Windows command-line utility that produces the following output.
Active Connections Proto Local Address Foreign Address State TCP 127.0.0.1:7869 CZ111:49770 ESTABLISHED TCP 127.0.0.1:49770 CZ222:7869 ESTABLISHED TCP 127.0.0.1:25678 CZ333:25678 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:42173 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:44356 ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:25678 91-14-55-5:https ESTABLISHED
C:\>
You are working at a Linux command prompt. You need to capture and analyze packets from the ethernet interface 0 using the tcpdump command. Type the command to start capturing the packets.
student@dojolab:~$
Type the Windows command-line utility that produces the following output.
Tracing route to 172.16.0.254 over a maximum of 30 hops 0 lab.dojolab.local [192.168.1.19] 1 192.168.1.1 2 172.16.0.254 Computing statistics for 50 seconds... Source to Here This Node/Link Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address 0 lab.dojolab.local [192.168.1.19] 0/ 100 = 0% | 1 1ms 0/ 100 = 0% 0/ 100 = 0% 192.168.1.1 0/ 100 = 0% | 2 1ms 0/ 100 = 0% 0/ 100 = 0% 172.16.0.254 Trace complete.
C:\>
Type the Windows command-line utility that produces the following output.
Reply from 1.2.3.4: bytes=32 time=25ms TTL=53 Reply from 1.2.3.4: bytes=32 time=77ms TTL=53 Reply from 1.2.3.4: bytes=32 time=23ms TTL=53 Reply from 1.2.3.4: bytes=32 time=67ms TTL=53 Statistics for 1.2.3.4: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 67ms, Maximum = 89ms, Average = 56ms
C:\>
You are troubleshooting a faulty network. You need to illustrate the route packets take through the inter-network in order to identify the weak spot. Assuming you are working on a Windows environment, type the command to find where the packets are dropped.
C:\>
Type the Windows command-line utility to view the ARP table stored in memory.
C:\>
Type the command-line utility to delete the ARP cache on your Windows workstation.
C:\>
The network administrator has changed the DHCP settings and now your computer is unable to get an IP address, subnet mask, and default gateway IP address. The network administrator asks you to send him a screenshot of your TCP/IP configuration values.
Type the command to reveal the network details of your workstation.
c:\>
You are working at a Kali Linux command prompt. You want to launch a DoS attack to a testing environment with IP 195.12.11.10. You are allowed to use only the hping3 command to send ICMP packets. Type the command to initiate a DoS attack.
student@dojolab:~$
You have been tasked to scan ONLY for open ports in the range 20-80 on the server 10.11.10.1 using netcat. The results of the scan should provide verbose information. Type the command to complete the task.
student@dojolab:~$
You want to capture HTTP packets using tcpdump. The HTTP service is running on its default port and your Ethernet adapter is eth1. Type the command to capture the packets.
student@dojolab:~$
You want to gather open-source intelligence information such as emails from the wgu.edu site using automated tools. Type the command to get a list of email addresses for WGU on a bing search.
student@dojolab:~$
You need to search and display the total number of times that the tag "h1" appears in a file named main.html using grep. Type the Linux command for it.
student@dojolab:~$
You are working at a Linux command prompt. Type the command to search all lines that start with "hello" in a file named greetings.txt.
student@dojolab:~$
You are working at a Linux command prompt. Type the command to search all lines that end with "done" in a file named tasks.doc.
student@dojolab:~$
You have been tasked to present the content of two log files. First, you need to display the content of the file named logfile1.txt and then the content of the file named logfile2.txt. Type the command to display the content of the two files.
student@dojolab:~$
Type the command to retrieve only email-related DNS records for the domain dojopass.org using the -query=mx option.
student@dojolab:~$