3. After exploiting a target with the Metasploit Meterpreter payload, a few days later, Alice loses access to the remote host. The vulnerability used to exploit the system originally is still open. What could be the reason that the malware scan discovered Meterpreter and removed it?
A) The system was patched
B) The system was rebooted
C) Meterpreter crashed
D) Buffer overflow
4. Taken under consideration the following bash one-liner command: What effect does the string {1..254} has in the above command?
A) All integers between 1 and 254 are indicated to be fed into the command for $i at once
B) All integers from 1 to 254 are indicated to be iteratively fed into the command for $i
C) Every other integer starting from 1 is indicated to be fed iteratively into the command for $i that stops once it reaches at least 254
D) The numbers 1 and 254 are indicated to be fed into the command for $i
5. Consider the above command-line, what is the effect of the string 2>&1 in this command?
A) Makes the ping command skip every second IP address in the numeric sequence
B) Redirects STDOUT to a file named &1
C) Concatenates STDERR to STDOUT before writing to a file named &1
D) Redirects STDERR to STDOUT