- Name one key feature that has been introduced in version 5 of the Metasploit Framework.
- Name at least three modules that exist in the Metasploit Framework.
- Name two external data sources that can be imported into the Metasploit Framework.
- Name at least two public repositories where additional modules can be downloaded.
- What is the difference between a bind shell and a reverse shell?




















































