Bug Bounty Program Certification 9.6: Brute Force Attacks on Websites
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a brute force attack?
To guess login credentials
To encrypt data
To optimize network speed
To scan for viruses
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which operating system is used in the tutorial for performing a brute force attack?
Kali Linux
macOS
Windows
Ubuntu
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the URL of the website used for the brute force attack demonstration?
vulnerableapp.com
example.com
testphp.vulnweb.com
demo.testfire.net
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is used to intercept requests in the tutorial?
Metasploit
Nmap
Burp Suite
Wireshark
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which IP address and port number are used for proxy settings in Burp Suite?
192.168.1.1 and 8080
10.0.0.1 and 80
127.0.0.1 and 8080
172.16.0.1 and 443
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What feature of Burp Suite is used to perform the brute force attack?
Decoder
Repeater
Scanner
Intruder
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the correct username and password combination found during the attack?
admin/admin
user/user
test/test
guest/guest
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
8 questions
DC Fire: 'We don't believe there are any survivors' after helicopter collides with passenger jet
Interactive video
•
University
6 questions
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks
Interactive video
•
University
6 questions
AZ-104: Microsoft Azure Administrator Full Course - Log Analytics
Interactive video
•
University
11 questions
CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication
Interactive video
•
University
11 questions
The Scope of Threat
Interactive video
•
University
8 questions
Posterior Shear Test for Lumbar Instability | Rationale & Interpretation
Interactive video
•
University
8 questions
PEARL HARBOUR (MOVIETONE PICTURES) -
Interactive video
•
KG - University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
9 questions
Principles of the United States Constitution
Interactive video
•
University
18 questions
Realidades 2 2A reflexivos
Quiz
•
7th Grade - University
10 questions
Dichotomous Key
Quiz
•
KG - University
25 questions
Integer Operations
Quiz
•
KG - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University
20 questions
SER vs ESTAR
Quiz
•
7th Grade - University