Bug Bounty Program Certification 9.6: Brute Force Attacks on Websites

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a brute force attack?
To guess login credentials
To encrypt data
To optimize network speed
To scan for viruses
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which operating system is used in the tutorial for performing a brute force attack?
Kali Linux
macOS
Windows
Ubuntu
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the URL of the website used for the brute force attack demonstration?
vulnerableapp.com
example.com
testphp.vulnweb.com
demo.testfire.net
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is used to intercept requests in the tutorial?
Metasploit
Nmap
Burp Suite
Wireshark
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which IP address and port number are used for proxy settings in Burp Suite?
192.168.1.1 and 8080
10.0.0.1 and 80
127.0.0.1 and 8080
172.16.0.1 and 443
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What feature of Burp Suite is used to perform the brute force attack?
Decoder
Repeater
Scanner
Intruder
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the correct username and password combination found during the attack?
admin/admin
user/user
test/test
guest/guest
Create a free account and access millions of resources
Similar Resources on Wayground
5 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Password Recovery Attacks

Interactive video
•
University
8 questions
Fundamentals of Secure Software - SKF Labs Demo

Interactive video
•
University
2 questions
Intercept_ Analyze_ and Replay Web Traffic

Interactive video
•
University
11 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Command Injection

Interactive video
•
University
5 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Printing Banner

Interactive video
•
University
11 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for SQL Injection Demo

Interactive video
•
University
11 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Password Recovery Attacks

Interactive video
•
University
11 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Brute Force Attacks with BurpSuite

Interactive video
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University