Module 3. Exploitation

Module 3. Exploitation

University

23 Qs

quiz-placeholder

Similar activities

Pra UPS 2

Pra UPS 2

University

20 Qs

Testing dan Implementasi UTS

Testing dan Implementasi UTS

KG - University

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

ETHICAL, LEGAL, AND SOCIAL ISSUES OF INFORMATION TECHNOLOGY

ETHICAL, LEGAL, AND SOCIAL ISSUES OF INFORMATION TECHNOLOGY

University

20 Qs

Keamanan Komputer - Kuis Free UTS

Keamanan Komputer - Kuis Free UTS

1st Grade - University

20 Qs

A level Y12 Data Representation - Numbers SETS

A level Y12 Data Representation - Numbers SETS

11th Grade - University

18 Qs

Relational Algebra and Calculus

Relational Algebra and Calculus

University

20 Qs

IS 4-2 Risk Management & Control

IS 4-2 Risk Management & Control

University

20 Qs

Module 3. Exploitation

Module 3. Exploitation

Assessment

Quiz

Computers

University

Hard

Created by

Sebastian Zamorano

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of the exploitation phase?
Break down the systems
Remote code execution
Gain root privileges
Cracking the remote machine password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following accounts has the least privileges?
Admin
System
Service
User

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following shell types is LESS likely to be blocked by a firewall?
Bind shell
Dumb shell
Fully interactive TTY shell
Reverse shell

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of staged payloads?
Smaller
Less stable
Sent at once
Has a stager

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of single payloads?

Larger
More stable
Sent at once
Has a stager

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an interface of the Metasploit Framework?
msfconsole
msfvenom
searchsploit
Metasploit Pro

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the command to implement an enter to the context of a module in msfconsole?
use
show
run
set

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?