Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a public IP address?

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Who uses Metasploit?

A.

Agricultural engineers.

B.

Food engineers.

C.

Cybersecurity experts.

What is a remote exploit?

A.

It is a type of computer attack in which a hacker or attacker attempts to exploit vulnerabilities in a computer system, network or application from a remote location.

B.

It is a type of computer attack that targets vulnerabilities present in an operating system, application or software in a local environment.

C.

It is a type of social engineering attack for all types of users.

What is a SQL Injection?

A.

It is a SQL code execution that only the administrator can perform.

B.

It is a database used by hackers.

C.

Manipulation of SQL queries to access, modify or delete data in a database.

What is masquerading?

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

What is active recognition?

A.

We only see the target without performing actions.

B.

Gathers information by interacting with the target.

C.

Recognizes the target but does nothing.

Is it illegal to practice with VulnHub machines?

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

What is a reverse shell?

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

What is a White Hat hacker?

A.

A cybersecurity professional who uses their skills to legally identify and fix vulnerabilities in systems, networks, or applications to improve security.

B.

A person who creates exploits solely to expose vulnerable systems without authorization.

C.

A hacker who exploits vulnerabilities to steal or sell sensitive information for personal profit.

According to what we have seen in the course, is it possible to do phishing outside our network?

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.