What is the term used to describe an attack technique that takes advantage of a vulnerability in a system or application?
Exploit
Which operating system is not natively supported by Metasploit?
iOS
Which protocol is used to share files and printers between computers on a network?
SMB
Which attack technique involves tricking a user into divulging sensitive information?
Spear phishing
What is the name of the post-exploitation payload used in Metasploit?
Meterpreter
Which attack technique involves flooding a network or system with traffic to disrupt its normal operation?
Denial of service
Which module type in Metasploit is used to perform actions after a successful exploitation?
Post-exploitation modules
Which programming language is used to write Metasploit?
Ruby
What type of shell is created when a connection is made from the target to the attacker's machine?
Reverse shell
Which tool is commonly used for network reconnaissance?
nmap
Which module type in Metasploit is used to perform the actual exploitation?
Exploit
Which type of vulnerability allows an attacker to execute code on a remote system?
Remote code execution
What is the term used to describe the process of using one compromised system to attack other systems on the same network?
Pivoting
What is the term used to describe the actual executable code that is injected into a target system during an exploit?
Shellcode
Which type of data can be stolen through a password attack?
Credentials
Which tool is commonly used to capture and analyze network traffic?
wireshark
Which attack technique involves capturing the keystrokes of a user to steal login credentials?
Keylogging
What is the name of the post-exploitation payload used in Metasploit that provides a powerful interactive shell?
Meterpreter