1. Right Answer: B
Explanation: Net Shed is a proxy tool not an anonymizer.
2. Right Answer: A,B
Explanation: The most efficient means of minimizing output is to remove the command that only prints to the terminal if a host does not respond to ICMP requests and the majority of the IP addresses in question are suspected to be unavailable.
3. Right Answer: C
Explanation: Kernel version of a Linux host is returned uname -r , a more focused search for kernel-level exploits is facilitated. The specific release of a Linux host-s operating system is returned and a search for an exploit path can be focused by using this.
4. Right Answer: C
Explanation: The attack ret2libc is a type of buffer overflow. The existing subroutines in an application are exploited and writing a shellcode specifically for the attack is made unnecessary. The other options; NOP sled, or NOP slide, is a buffer overflow attack technique..
5. Right Answer: D
Explanation: Empire is the described framework. It relies on agents that run on target systems (PowerShell 2.0 for Windows; Python 2.6/2.7 for Linux and macOS) PowerShell agents are then run by using them without invoking PowerShell and modules for keylogging, Mimikatz, and various other functions are provided. Components of other open-source projects are integrated and numerous simple, post-exploitation tools are more effectively presentable with Empire.