Intro to Metasploit 1

What is the term used to describe an attack technique that takes advantage of a vulnerability in a system or application?
Payload
Scanner
Auxiliary
Exploit
Exploit
Which operating system is not natively supported by Metasploit?
Android
Windows
Linux
iOS
iOS
Which protocol is used to share files and printers between computers on a network?
SMB
SMTP
HTTP
TCP
SMB
Which attack technique involves tricking a user into divulging sensitive information?
SQL injection
DDoS
Spear phishing
Social engineering
Spear phishing
What is the name of the post-exploitation payload used in Metasploit?
Malware
Trojan
Backdoor
Meterpreter
Meterpreter
Which attack technique involves flooding a network or system with traffic to disrupt its normal operation?
Scanning
enumeration
Denial of service
Fuzzing
Denial of service
Which module type in Metasploit is used to perform actions after a successful exploitation?
Exploit modules
Post-exploitation modules
Payload modules
Auxiliary modules
Post-exploitation modules
Which programming language is used to write Metasploit?
Ruby
python
Java
PHP
Ruby
What type of shell is created when a connection is made from the target to the attacker's machine?
Reverse shell
Meterpreter shell
Trojan
Bind shell
Reverse shell
Which tool is commonly used for network reconnaissance?
wireshark
nmap
Burp Suite
nessus
nmap
Which module type in Metasploit is used to perform the actual exploitation?
Scanner
Exploit
Auxiliary
Payload
Exploit
Which type of vulnerability allows an attacker to execute code on a remote system?
Remote code execution
Local privilege escalation
SQL injection
cross-site scripting
Remote code execution
What is the term used to describe the process of using one compromised system to attack other systems on the same network?
Pivoting
Tunneling
Port forwarding
Routing
Pivoting
What is the term used to describe the actual executable code that is injected into a target system during an exploit?
Heap spray
Format string
NOP sled
Shellcode
Shellcode
Which type of data can be stolen through a password attack?
Database
Hashes
Credentials
Exploit
Credentials
Which tool is commonly used to capture and analyze network traffic?
wireshark
Arp-scan
nmap
Netcat
wireshark
Which attack technique involves capturing the keystrokes of a user to steal login credentials?
Packet sniffing
Credential harvesting
Keylogging
Web scraping
Keylogging
What is the name of the post-exploitation payload used in Metasploit that provides a powerful interactive shell?
Reverse shell
Trojan
Meterpreter
Bind shell
Meterpreter
Your Score
Score Label
Score Summary