
Create Your First Trojan and Infiltrate a Target
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Metasploit Ibbl used for?
A secure Linux machine for testing
A tool for creating secure networks
An intentionally vulnerable Linux machine for practicing exploits
A Windows 10 emulator
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the attack process on Windows 10?
Running the Metasploit console
Creating a malicious executable program
Changing the IP address
Downloading Metasploit Ibbl
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to combine MSF payload and MSF encode?
MSF Combine
MSF Venom
MSF Join
MSF Merge
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which payload is used in the demonstration?
Windows Meterpreter Reverse TCP
Linux Shell Reverse TCP
Windows Shell Bind TCP
Linux Meterpreter Bind TCP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the 'multi/handler' command in Metasploit?
To start the Metasploit console
To encode the payload
To handle incoming connections from the target
To create a new payload
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to list the directory contents on the compromised machine?
dir
ls
list
show
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command allows you to acquire a Windows shell on the target machine?
run
shell
cmd
execute
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?