GFACT CERTIFICATE EXAM 2025 UPDATE QUESTIONS AND CORRECT
VERIFIED ANSWERS ALREADY GRADED A+ (BRAND NEW VISION)
What is Privilege Escalation?
A) Where you gain the highest level of access within a system
B) Where you gain a higher privilege in life
C) Where you escalate privilege of a user to meet their needs for work
D) None of the above - answersWhere you gain the highest level of access within a system
What are some of the ways to perform privilege escalation?
A) Exploiting Services
B) Exploiting the Kernel
C) SUID Files
D) All of the above - answersAll of the above
(B3, Pg261) What is a Wildcard injection?
A) Where you take advantage of a code but supplementing Wildcards within code
B) Where you use wild cards to help run the command in question
C) Where you use a parameter to run code in a command prompt
D) None of the above - answersWhere you take advantage of a code but supplementing
Wildcards within the code
,What is the difference between "sudo" and "su"?
A) There is no difference
B) Sudo is allowed by the admin to run a command while su is to become the admin
C) Su is allowed by the admin to run a command while sudo is to become the admin
D) Sudo is more used in Linux while su is a Kali Linux command - answersSudo is allowed by the
admin to run a command while su is to become the admin
(B3, Pg272) What is the highest level of privileges on a Windows machine?
A) Admin
B) User
C) SYSTEM
D) Root - answersSYSTEM
(B3, Pg274) What is considered the easiest way to bypass UAC? (User Access Control)
A) To ask the administrator for the permissions
B) To Privilege escalate your user account
C) To become the SYSTEM User
D) None of the above - answersTo ask the administrator for the permissions
(B1, Pg270) Which packet type is used when a graceful TCP Teardown fails?
A) FIN
B) RST
,C) EXIT
D) ACK/FIN - answersRST
(B3, Pg135) Which of the following is a likely source of logs for HTTP network traffic data?
A) Layer 2 switch
B) Firewall
C) DNS Server
D) Active Directory Server - answersFirewall
(B2, Pg275) Which of the following is a Windows Database of settings for both the operating
system and applications?
A) Group Policy
B) User Access Control
C) PowerShell
D) Registry - answersRegistry
(B3, Pg86-87) A Red Team would use the following command for which purposes?
# nmap -vv -sS -p- 10.10.1.1
A) Identifying open ports that could be used to compromise a host
B) Determining updates needed for the host's asset inventory record
C) Identifying unauthorized open ports to disable on the host
D) Determining version information for services running on the host - answersIdentifying open
ports that could be used to compromise a host
, (B1, Pg107) What is the software or firmware platform that hosts a virtual machine called?
A) Guest System
B) Hypervisor
C) Container
D) Operating System - answersHypervisor
(B1, Pg140) Which of the following Linux permissions would allow the owner of a file to read,
write, and execute a file while allowing everyone else to read and execute?
A)755
B)700
C)644
D)411 - answers755
(B3, Pg305) In Linux which command will show the mode that the operating system is currently
running under?
A) runlevel
B) chkconfig
C) uname
D) systemctl - answersrunlevel
(B3, Pg21) What feature of HTTPS encryption solves the trust problem in the asymmetric key
exchange?
VERIFIED ANSWERS ALREADY GRADED A+ (BRAND NEW VISION)
What is Privilege Escalation?
A) Where you gain the highest level of access within a system
B) Where you gain a higher privilege in life
C) Where you escalate privilege of a user to meet their needs for work
D) None of the above - answersWhere you gain the highest level of access within a system
What are some of the ways to perform privilege escalation?
A) Exploiting Services
B) Exploiting the Kernel
C) SUID Files
D) All of the above - answersAll of the above
(B3, Pg261) What is a Wildcard injection?
A) Where you take advantage of a code but supplementing Wildcards within code
B) Where you use wild cards to help run the command in question
C) Where you use a parameter to run code in a command prompt
D) None of the above - answersWhere you take advantage of a code but supplementing
Wildcards within the code
,What is the difference between "sudo" and "su"?
A) There is no difference
B) Sudo is allowed by the admin to run a command while su is to become the admin
C) Su is allowed by the admin to run a command while sudo is to become the admin
D) Sudo is more used in Linux while su is a Kali Linux command - answersSudo is allowed by the
admin to run a command while su is to become the admin
(B3, Pg272) What is the highest level of privileges on a Windows machine?
A) Admin
B) User
C) SYSTEM
D) Root - answersSYSTEM
(B3, Pg274) What is considered the easiest way to bypass UAC? (User Access Control)
A) To ask the administrator for the permissions
B) To Privilege escalate your user account
C) To become the SYSTEM User
D) None of the above - answersTo ask the administrator for the permissions
(B1, Pg270) Which packet type is used when a graceful TCP Teardown fails?
A) FIN
B) RST
,C) EXIT
D) ACK/FIN - answersRST
(B3, Pg135) Which of the following is a likely source of logs for HTTP network traffic data?
A) Layer 2 switch
B) Firewall
C) DNS Server
D) Active Directory Server - answersFirewall
(B2, Pg275) Which of the following is a Windows Database of settings for both the operating
system and applications?
A) Group Policy
B) User Access Control
C) PowerShell
D) Registry - answersRegistry
(B3, Pg86-87) A Red Team would use the following command for which purposes?
# nmap -vv -sS -p- 10.10.1.1
A) Identifying open ports that could be used to compromise a host
B) Determining updates needed for the host's asset inventory record
C) Identifying unauthorized open ports to disable on the host
D) Determining version information for services running on the host - answersIdentifying open
ports that could be used to compromise a host
, (B1, Pg107) What is the software or firmware platform that hosts a virtual machine called?
A) Guest System
B) Hypervisor
C) Container
D) Operating System - answersHypervisor
(B1, Pg140) Which of the following Linux permissions would allow the owner of a file to read,
write, and execute a file while allowing everyone else to read and execute?
A)755
B)700
C)644
D)411 - answers755
(B3, Pg305) In Linux which command will show the mode that the operating system is currently
running under?
A) runlevel
B) chkconfig
C) uname
D) systemctl - answersrunlevel
(B3, Pg21) What feature of HTTPS encryption solves the trust problem in the asymmetric key
exchange?