Intro to Metasploit 1

What is the term used to describe an attack technique that takes advantage of a vulnerability in a system or application?
Payload
Scanner
Exploit
Auxiliary
Exploit
Which operating system is not natively supported by Metasploit?
Windows
iOS
Linux
Android
iOS
Which protocol is used to share files and printers between computers on a network?
SMB
TCP
SMTP
HTTP
SMB
Which attack technique involves tricking a user into divulging sensitive information?
SQL injection
Spear phishing
DDoS
Social engineering
Spear phishing
What is the name of the post-exploitation payload used in Metasploit?
Meterpreter
Backdoor
Malware
Trojan
Meterpreter
Which attack technique involves flooding a network or system with traffic to disrupt its normal operation?
Denial of service
Fuzzing
enumeration
Scanning
Denial of service
Which module type in Metasploit is used to perform actions after a successful exploitation?
Post-exploitation modules
Payload modules
Exploit modules
Auxiliary modules
Post-exploitation modules
Which programming language is used to write Metasploit?
Ruby
Java
PHP
python
Ruby
What type of shell is created when a connection is made from the target to the attacker's machine?
Reverse shell
Bind shell
Meterpreter shell
Trojan
Reverse shell
Which tool is commonly used for network reconnaissance?
Burp Suite
nmap
nessus
wireshark
nmap
Which module type in Metasploit is used to perform the actual exploitation?
Auxiliary
Exploit
Scanner
Payload
Exploit
Which type of vulnerability allows an attacker to execute code on a remote system?
SQL injection
cross-site scripting
Remote code execution
Local privilege escalation
Remote code execution
What is the term used to describe the process of using one compromised system to attack other systems on the same network?
Tunneling
Routing
Port forwarding
Pivoting
Pivoting
What is the term used to describe the actual executable code that is injected into a target system during an exploit?
Format string
Shellcode
Heap spray
NOP sled
Shellcode
Which type of data can be stolen through a password attack?
Exploit
Database
Hashes
Credentials
Credentials
Which tool is commonly used to capture and analyze network traffic?
Arp-scan
Netcat
nmap
wireshark
wireshark
Which attack technique involves capturing the keystrokes of a user to steal login credentials?
Web scraping
Packet sniffing
Credential harvesting
Keylogging
Keylogging
What is the name of the post-exploitation payload used in Metasploit that provides a powerful interactive shell?
Reverse shell
Bind shell
Trojan
Meterpreter
Meterpreter
Your Score
Score Label
Score Summary