Exam 2: Reconnaissance

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

With ____, a user is tricked into giving private information about his or her account with a known large organization.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

Describe some illegal reconnaissance activities.

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

There are a number of plainly illegal reconnaissance techniques. Developing a "front" company and acting as a representative of that company, specifically for the purpose of robbing or defrauding the target company, is probably illegal. Furthermore, being expensive and time consuming, this is probably reserved for the professional intel agencies. Stealing garbage is illegal in many locales. Entering a home or office to look for information is also illegal, but this often goes undetected as no valuables are being removed. Dropping a keylogger-a tool that records users' keystrokes-on a vulnerable machine is illegal. Leaving a sniffer, which can intercept and read data packets, on a network is illegal.

Reconnaissance is not by definition illegal, and many reconnaissance techniques are completely legal.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

Describe conformity as a social engineering technique.

(Essay)
4.9/5
(43)

Newsgroups are part of an online bulletin board system called ____, which contains groups covering a huge variety of subjects.

(Multiple Choice)
4.8/5
(35)

The Linux command ____________________ shows you where the files appear in your PATH.

(Short Answer)
4.9/5
(33)

There are two ping utilities available for a Linux or Unix machine: ping and ____________________.

(Short Answer)
4.8/5
(35)

____ is an Internet tool that aids in retrieving domain name-specific information from the NSI Registrar database.

(Multiple Choice)
4.9/5
(32)

Most social engineering attacks are opportunistic: the hacker uses whatever technique he or she thinks fits the situation.

(True/False)
4.8/5
(35)

____ is a method of achieving access to information by actually joining the organization as an employee or a consultant.

(Multiple Choice)
4.9/5
(30)

____________________ is the act of locating targets and developing the methods necessary to attack those targets successfully.

(Short Answer)
5.0/5
(39)

The strongest link in any security scheme is the user.

(True/False)
4.9/5
(40)

Breaking CD-ROMs is sufficient to destroy their data, as data cannot be recovered from broken disks.

(True/False)
4.8/5
(31)

____________________ is a DNS feature that lets a DNS server update its database with the list of domain names in another DNS server.

(Short Answer)
4.8/5
(37)

Describe some legal reconnaissance activities.

(Essay)
4.8/5
(27)

____________________ is the process of identifying domain names as well as other resources on the target network.

(Short Answer)
4.9/5
(34)

____ uses influence and persuasion to deceive people by convincing them that the social engineer is someone he isn't, or by manipulation.

(Multiple Choice)
4.9/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)