
Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What operating systems are used in the tutorial for creating and transferring Trojans?
Kali Linux and Windows 10
Ubuntu and Windows 7
MacOS and Windows 8
Fedora and Windows XP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the Zorica 2 framework in the tutorial?
To create a secure network
To install antivirus software
To update the operating system
To generate fully undetectable payloads
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to provide execution permission to the Zorica 2 script?
chmod 644 Zorica2.sh
chmod -r Zorica2.sh
chmod 777 Zorica2.sh
chmod +x Zorica2.sh
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a multi-encoded payload do?
It compresses the payload
It duplicates the payload
It encrypts the payload multiple times
It deletes the payload
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which port number is used to transfer the payload using a Python server?
443
21
8080
8000
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the meterpreter session in the tutorial?
To create a backup
To install software
To access the target system's command prompt
To update the system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the significance of bypassing Windows Defender in the tutorial?
To allow the payload to execute without being blocked
To ensure the payload is detected
To uninstall Windows Defender
To update Windows Defender
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?