lab2
lab2
com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a
10/10
Congratulations, you passed!
Duration: 39 minutes, 26 seconds
What is the Computer name displayed by this meterpreter command in the box Score: 1
below?
MS10
Arduino-based
Wireless
Spear phishing
SQL Injection
https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 1/2
1/3/25, 1:59 AM labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a
Powershell
Arachni
Metasploit
SMTP binder
Maltego
The most commonly used features of SET are spear phishing, website spoofing, Score: 1
payload delivery, and mass mailer attacks. True or False?
True
False
Congratulations, you have answered the question correctly.
What is the primary limitation or restriction in compromising a victim through a SET- Score: 1
crafted email and related exploit script/payload?
Client-side security blocking execution
Server keyword filtering
Firewall blocking email messages with attachments
NAT traversal
Which of the following are true in regard to using SET? (Select all that apply) Score: 1
https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 2/2