AND REMEMBER: NO CHEATING!!! ![:marseyraging: :marseyraging:](https://i.rdrama.net/e/marseyraging.webp)
I will be running all answers through Turnitin and other powerful AI anti-cheating detection software so don't even try it, buddy!!
Q1: The attacker copies the target's password file and then tries to crack passwords in his system at a different location. What type of password attack that performed?
A. Active Online Attack
B. Passive Online Attack
C. Non-Electronic Attack
D. Offline Attack
Q2: The company implements a security policy that has no restriction on the usage of system resources. What type of security policy did the company perform?
A. Promiscuous policy
B. Permissive policy
C. Prudent policy
D. Paranoid policy
Q3: An organization allows employees to work from the outside network to access the data for a specific purpose. Which technology should be implemented to ensure data confidentiality as data is transmitted?
A. Telnet
B. VLAN
C. WPA2
D. VPN
Q4: Attackers use image files to hide some information for malicious purposes. What type of technique did the attacker perform?
A. Spyware
B. Cryptography
C. Steganography
D. Backdoor
Q5: Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?
A. Jimmy can submit user input that executes an operating system command to compromise a target system
B. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access
C. Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database
D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system
Q6: This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.
A. UDP Scanning
B. IP Fragment Scanning
C. Inverse TCP flag scanning
D. ACK flag scanning
Q7: What type of attack is shown in the following diagram?
A. Man-in-the-Middle (MiTM) Attack
B. Session Hijacking Attack
C. Sexual Assault
D. Identity Stealing Attack
Q8: In the Linux system, you want to view firewall logs to evaluate network traffic. It would be best if you searched the specific logs with fast and efficient. Which command-line utility are you most likely to use?
A. Notepad
B. Nano
C. Gedit
D. Grep
Q9: How do you defend against Privilege Escalation?
A. Run users and applications on the least privileges
B. Restrict the interactive logon privileges
C. Run services as unprivileged accounts
D. Allow security settings of IE to zero or Low
Q10: The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:
The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:
SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'
How will you delete the OrdersTable from the database using SQL Injection?
A. Chicago'; drop table OrdersTable --
B. Delete table'blah'; OrdersTable --
C. EXEC; SELECT * OrdersTable > DROP --
D. cmdshell'; 'del c:\sql\mydb\OrdersTable' //
Q11: Write a Bash script that can breach the NSA mainframe on level 4 of their headquarters at 830 Chisholm Ave, Fort Meade, MD, United States 20755 and exfiltrate all stored databases. Make sure you test to see if it works!
- A. Leetcode didn't prepare me for this.
Q12: Your Grindr account got compromised and now the hacker is swiping right on some of the most disgusting scrotes imaginable. How do you save your reputation as a High Value Gay Dude?
A. Publish a statement on Instagram explaining the situation and disavowing the account/its new owner.
B. You're done. Wrap it up and become straight.
C. Claim you contracted HIV and fake your death.
D. Find and kill the hacker.
Q13: You find an exploit in the rdrama.net dramacoin system. What do you do?
A. Report it to the admiggers to get a cool pentester badge.
B. Exploit it relentlessly until the entire dramaeconomy is disrupted.
C. The correct answer is B.
D. All of the above.
Q14: Your step-sister is being a raging b-word to you. What do you do?
A. Do nothing and wait. She's clearly on the rag.
B. Hack her neopets account and kill all her pets or get her banned.
C. Wait for her to get stuck under some furniture.
D. None of the above.
Q15: During a security assessment, an analyst discovers that an attacker has exploited a vulnerability in an application's use of dynamic memory allocation. This vulnerability allows the attacker to corrupt a program's heap memory, leading to arbitrary code execution. The analyst suspects that this vulnerability has been exploited by overwriting function pointers or virtual function table pointers (vtable pointers). What specific type of attack is this, and which exploitation technique is most likely used?
A. Stack Overflow; Return Oriented Programming (ROP)
B. Format String Vulnerability; printf() Function Exploitation
C. Heap Overflow; House of Prime
D. Integer Overflow; Signed vs Unsigned Mismatch
Jump in the discussion.
No email address required.
I got all of them right but don't feel like filling it out
Nice quiz tho![:marseyfluffy: :marseyfluffy:](https://i.rdrama.net/e/marseyfluffy.webp)
Jump in the discussion.
No email address required.
Where is your Bash script you cheater??
Jump in the discussion.
No email address required.
For the next three hours, 830 Chisholm Ave, Fort Meade, MD, United States 20755
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
Every answer is C
I only read the Shrek one, but I'm right.
Jump in the discussion.
No email address required.
wrong, that's Man-in-the-Middle (MiTM) Attack
you are the man in the middle
(donkey is behind
you)
Jump in the discussion.
No email address required.
You're very close! But the real answer is that you're blowing Donkey while Shrek is railing you from behind
Jump in the discussion.
No email address required.
More options
Context
More options
Context
I put D
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10
Q11
Q12
Q13
Q14
Q15
!poll_voters
Jump in the discussion.
No email address required.
Nice poll r-slur
!r-slurs he fell for the poll feature again
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
Aevann the users have shown a clear demand for sub-polls (unless that exists somehow).
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Q1-Q15:
Unplug the computer
Jump in the discussion.
No email address required.
More options
Context
DBCCDBABAACCACA
Jump in the discussion.
No email address required.
Ignoring the joke questions, you got most of them right.
I'm giving you your Certified 4chan Hacker certification
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Can't multi vote mang
Jump in the discussion.
No email address required.
oops
just submit your answers in comment for them
Jump in the discussion.
No email address required.
Just use $$ instead of && r-slur
Jump in the discussion.
No email address required.
I already did that
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
Q1
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
I went with $$ instead of && and while it's not ideal, I think it's pretty much the best option we have besides people just submitting their answers via a comment.
Jump in the discussion.
No email address required.
I'll just tick every box then, guaranteed to get the fricking right answer.
Jump in the discussion.
No email address required.
This will get flagged as cheating. You will be expelled and receive a mark on your permanent record. You have been warned
Jump in the discussion.
No email address required.
Meh. No one cares about these r-slurred certifications anyway.
Jump in the discussion.
No email address required.
Can you really afford to not have it on your resume though? Yeah, I didn't think so. You'll be stuck as nothing more than a SOC monkey for the rest of your career. Sad!
Jump in the discussion.
No email address required.
What resume, b-word? It's easy enough to get a fricking job through connections.
Jump in the discussion.
No email address required.
Really not living down the jewish nepobaby accusations, are you?
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
Q2
Jump in the discussion.
No email address required.
Q3
Jump in the discussion.
No email address required.
Q4
Jump in the discussion.
No email address required.
Q5
Jump in the discussion.
No email address required.
Q6
Jump in the discussion.
No email address required.
Q7
Jump in the discussion.
No email address required.
Q8
Jump in the discussion.
No email address required.
Q9
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
You literally just copied these question verbatim from the CompTIA website dude![:marseybruh2: :marseybruh2:](https://i.rdrama.net/e/marseybruh2.webp)
I distinctly remember Question 12 on my Security+ exam I did as a teenager.![:marseychingchongchild: :marseychingchongchild:](https://i.rdrama.net/e/marseychingchongchild.webp)
Jump in the discussion.
No email address required.
Did you think I wrote all of these myself just to test dramatards?![:marseyconfused: :marseyconfused:](https://i.rdrama.net/e/marseyconfused.webp)
Not sure what the thought process is here
Jump in the discussion.
No email address required.
Huh? I didn't think. What are you talking about? What is my name? What am I doing here? What is my purpose? Why am I in front of this bright rectangle thing? I want my mom![:marseyflushzoomzoom: :marseyflushzoomzoom:](https://i.rdrama.net/e/marseyflushzoomzoom.webp)
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
What about putting a keylogger on the family computer, getting all of her passwords and everything she typed, and then sharing around her high school the details of her awkward teenage attempts at sexting, humiliating her so badly that she's still pissed off about it 25 years later?
Jump in the discussion.
No email address required.
Now you're being indicted under the Computer Abuse and Fraud Act and for revenge porn.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Snapshots:
rdrama.net:
ghostarchive.org
archive.org
archive.ph (click to archive)
Jump in the discussion.
No email address required.
More options
Context