Intro to Metasploit 1

What is the term used to describe an attack technique that takes advantage of a vulnerability in a system or application?
Exploit
Payload
Auxiliary
Scanner
Exploit
Which operating system is not natively supported by Metasploit?
iOS
Windows
Linux
Android
iOS
Which protocol is used to share files and printers between computers on a network?
SMB
HTTP
SMTP
TCP
SMB
Which attack technique involves tricking a user into divulging sensitive information?
Spear phishing
Social engineering
DDoS
SQL injection
Spear phishing
What is the name of the post-exploitation payload used in Metasploit?
Meterpreter
Backdoor
Malware
Trojan
Meterpreter
Which attack technique involves flooding a network or system with traffic to disrupt its normal operation?
Denial of service
Scanning
enumeration
Fuzzing
Denial of service
Which module type in Metasploit is used to perform actions after a successful exploitation?
Post-exploitation modules
Exploit modules
Auxiliary modules
Payload modules
Post-exploitation modules
Which programming language is used to write Metasploit?
Ruby
python
Java
PHP
Ruby
What type of shell is created when a connection is made from the target to the attacker's machine?
Reverse shell
Bind shell
Meterpreter shell
Trojan
Reverse shell
Which tool is commonly used for network reconnaissance?
nmap
wireshark
nessus
Burp Suite
nmap
Which module type in Metasploit is used to perform the actual exploitation?
Exploit
Payload
Auxiliary
Scanner
Exploit
Which type of vulnerability allows an attacker to execute code on a remote system?
Remote code execution
Local privilege escalation
cross-site scripting
SQL injection
Remote code execution
What is the term used to describe the process of using one compromised system to attack other systems on the same network?
Pivoting
Tunneling
Port forwarding
Routing
Pivoting
What is the term used to describe the actual executable code that is injected into a target system during an exploit?
Shellcode
NOP sled
Heap spray
Format string
Shellcode
Which type of data can be stolen through a password attack?
Credentials
Database
Exploit
Hashes
Credentials
Which tool is commonly used to capture and analyze network traffic?
wireshark
nmap
Arp-scan
Netcat
wireshark
Which attack technique involves capturing the keystrokes of a user to steal login credentials?
Keylogging
Credential harvesting
Web scraping
Packet sniffing
Keylogging
What is the name of the post-exploitation payload used in Metasploit that provides a powerful interactive shell?
Meterpreter
Reverse shell
Bind shell
Trojan
Meterpreter
Your Score
Score Label
Score Summary