Vulnerabilities Labs Flashcards
Which tool is commonly used for port scanning during reconnaissance?
A) Nessus
B) Metasploit
C) Nmap
D) Wireshark
C
What is the primary function of OpenVAS?
A) Network traffic analysis
B) Vulnerability scanning
C) Exploit development
D) Malware analysis
B
In Nmap, which option is used for a SYN scan?
A) -A
B) -sS
C) -O
D) -Pn
B
Which phase of penetration testing focuses on identifying weaknesses?
A) Exploitation
B) Post-exploitation
C) Reconnaissance
D) Vulnerability assessment
D
What does CVSS stand for?
A) Common Vulnerability System Standard
B) Critical Vulnerability Scoring System
C) Common Vulnerability Scoring System
D) Cyber Vulnerability Standard System
C
Which tool is widely used for exploiting vulnerabilities?
A) Nmap
B) OpenVAS
C) Nessus
D) Metasploit Framework
D
What is a payload in the context of exploitation?
A) A script for scanning
B) A malicious code to be executed on the target
C) A protocol for secure communication
D) A software patch
B
Which Metasploit command lists available exploits?
A) show payloads
B) show exploits
C) list modules
D) exploit db
B
What does reverse shell refer to in exploitation?
A) A program that prevents exploitation
B) A type of shell that connects back to the attacker’s machine
C) A shell script for recon
D) An encrypted communication channel
B
What is the purpose of privilege escalation?
A) To scan for vulnerabilities
B) To gain higher-level access on the target system
C) To execute a denial-of-service attack
D) To identify open ports
B
What is the purpose of vulnerability scanning?
A) To exploit a system
B) To identify potential security weaknesses
C) To install security patches
D) To monitor network traffic
B
Which tool is best suited for comprehensive vulnerability management?
A) Metasploit
B) OpenVAS
C) Wireshark
D) Hydra
B
Which protocol is most commonly scanned for misconfigurations in servers?
A) FTP
B) SSH
C) HTTP
D) All of the above
D
Which option in Nmap is used for OS detection?
A) -sS
B) -Pn
C) -O
D) -A
C
What is the output of a vulnerability scanner?
A) Exploit code
B) Encrypted files
C) A list of identified vulnerabilities
D) A list of blocked IPs
C
Which of the following tools performs vulnerability scans and compliance checks?
A) Nmap
B) Nessus
C) Metasploit
D) Nikto
B
What is Nikto primarily used for?
A) Network scanning
B) Web server vulnerability assessment
C) Exploitation
D) Port scanning
B
Which severity metric is included in CVSS?
A) Base score
B) Network complexity
C) Exploit availability
D) Authentication level
A
Which tool uses plugins for specific vulnerability checks?
A) OpenVAS
B) Wireshark
C) Nmap
D) Burp Suite
A
What is the first step in vulnerability testing?
A) Exploitation
B) Reconnaissance
C) Scanning
D) Reporting
B
What is the primary role of Metasploit?
A) Analyzing network traffic
B) Exploiting vulnerabilities
C) Scanning networks
D) Generating SSL certificates
B
What does RCE stand for in exploitation?
A) Remote Code Execution
B) Root Compromise Exploit
C) Remote Credential Extraction
D) Recursive Code Examination
A
Which of the following best describes a shellcode?
A) Encrypted user credentials
B) Malicious code used during exploitation
C) A command-line scanning tool
D) A debugger for analyzing code
B
What is the default port for the Metasploit RPC server?
A) 443
B) 80
C) 8080
D) 55553
D