
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Brute Forcing SSH with Metasploit
Interactive Video
•
Information Technology (IT), Architecture, Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in setting up the Metasploit framework for scanning?
Install Metasploit table
Run a vulnerability scan
Start the Metasploit console
Start the OWASP virtual machine
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default username for logging into the OWASP virtual machine?
admin
root
guest
user
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is used to scan for open ports and services on the OWASP virtual machine?
Wireshark
Metasploit
nmap
Burp Suite
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using the auxiliary scanner in Metasploit?
To configure network settings
To install new modules
To scan for SSH vulnerabilities
To update the Metasploit framework
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which option is necessary to specify the target IP address in Metasploit?
set target
set address
set IP
set rhosts
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of setting 'stop on success' to true during a brute force attack?
To log all failed attempts
To increase the speed of the attack
To stop the attack once a valid credential is found
To continue the attack even after success
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to use a password list during a brute force attack?
To automate the guessing of passwords
To ensure faster network speed
To verify the IP address
To update the Metasploit framework
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?