
Bug Bounty Program Certification 9.6: Brute Force Attacks on Websites
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a brute force attack?
To guess login credentials
To encrypt data
To optimize network speed
To scan for viruses
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which operating system is used in the tutorial for performing a brute force attack?
Kali Linux
macOS
Windows
Ubuntu
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the URL of the website used for the brute force attack demonstration?
vulnerableapp.com
example.com
testphp.vulnweb.com
demo.testfire.net
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is used to intercept requests in the tutorial?
Metasploit
Nmap
Burp Suite
Wireshark
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which IP address and port number are used for proxy settings in Burp Suite?
192.168.1.1 and 8080
10.0.0.1 and 80
127.0.0.1 and 8080
172.16.0.1 and 443
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What feature of Burp Suite is used to perform the brute force attack?
Decoder
Repeater
Scanner
Intruder
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the correct username and password combination found during the attack?
admin/admin
user/user
test/test
guest/guest
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
8 questions
Master Microservices with Spring Boot and Spring Cloud - Step 18 – Using Feign REST Client for Service Invocation – V2
Interactive video
•
University
8 questions
The Beginners 2022 Cyber Security Awareness Training Course - IoT / Internet of Things
Interactive video
•
University
8 questions
CISSP Crash Course - Cryptanalytic Attacks
Interactive video
•
University
6 questions
Gardai mark 100 years of protecting Ireland from ‘sustained threats’
Interactive video
•
University
6 questions
Faster Wage Growth May Lead to Fed Policy Mistake, Says Vanguard's Davis
Interactive video
•
University
6 questions
Facebook outage: Computer science expert explains what went wrong
Interactive video
•
University
11 questions
What is a deepfake? How to prepare for and respond to this cyber attack
Interactive video
•
University
11 questions
If Only They Had...
Interactive video
•
University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
5 questions
What is Presidents' Day?
Interactive video
•
10th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
20 questions
Mardi Gras History
Quiz
•
6th Grade - University
10 questions
The Roaring 20's Crash Course US History
Interactive video
•
11th Grade - University
17 questions
Review9_TEACHER
Quiz
•
University