Given below are the steps to exploit a system using the Metasploit framework. Verify exploit options Configure an active exploit Select a target Launch the exploit Select a payload What is the correct sequence of steps through which a system can be exploited?