Question: 31. What does the run command do? a) run command is only used on the metasploitable machine b) run command runs the actual exploit c)
31. What does the run command do? a) run command is only used on the metasploitable machine b) run command runs the actual exploit c) run is not a valid command d) run is a Kali command 32. hostname is a? a) linux command b) kali command c) Metasploit command d) Part of nmap 33. id is aand shows a) kali command, shows root id b) linux command, shows msfadmin id c) kali command, shows root id d) linux command, shows root id 34. what does 'touch /home/msfadmin/ftp-hack' do? a) creates a 2 byte file on the metasploitable machine in the /msfadmin folder b) creates a 1 byte file on the metasploitable machine in the /home folder c) creates a O byte file on the meta d) creates a 3 byte file on the metasploitable machine in the /home/msfadmin folder sploitable machine in the /home/msfad min folder 35. This was the most boring class I ever took, a) True b) False
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
