Exam 2: Reconnaissance
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
With ____, a user is tricked into giving private information about his or her account with a known large organization.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
B
Describe some illegal reconnaissance activities.
Free
(Essay)
4.8/5
(38)
Correct Answer:
There are a number of plainly illegal reconnaissance techniques. Developing a "front" company and acting as a representative of that company, specifically for the purpose of robbing or defrauding the target company, is probably illegal. Furthermore, being expensive and time consuming, this is probably reserved for the professional intel agencies. Stealing garbage is illegal in many locales. Entering a home or office to look for information is also illegal, but this often goes undetected as no valuables are being removed. Dropping a keylogger-a tool that records users' keystrokes-on a vulnerable machine is illegal. Leaving a sniffer, which can intercept and read data packets, on a network is illegal.
Reconnaissance is not by definition illegal, and many reconnaissance techniques are completely legal.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
Newsgroups are part of an online bulletin board system called ____, which contains groups covering a huge variety of subjects.
(Multiple Choice)
4.8/5
(35)
The Linux command ____________________ shows you where the files appear in your PATH.
(Short Answer)
4.9/5
(33)
There are two ping utilities available for a Linux or Unix machine: ping and ____________________.
(Short Answer)
4.8/5
(35)
____ is an Internet tool that aids in retrieving domain name-specific information from the NSI Registrar database.
(Multiple Choice)
4.9/5
(32)
Most social engineering attacks are opportunistic: the hacker uses whatever technique he or she thinks fits the situation.
(True/False)
4.8/5
(35)
____ is a method of achieving access to information by actually joining the organization as an employee or a consultant.
(Multiple Choice)
4.9/5
(30)
____________________ is the act of locating targets and developing the methods necessary to attack those targets successfully.
(Short Answer)
5.0/5
(39)
Breaking CD-ROMs is sufficient to destroy their data, as data cannot be recovered from broken disks.
(True/False)
4.8/5
(31)
____________________ is a DNS feature that lets a DNS server update its database with the list of domain names in another DNS server.
(Short Answer)
4.8/5
(37)
____________________ is the process of identifying domain names as well as other resources on the target network.
(Short Answer)
4.9/5
(34)
____ uses influence and persuasion to deceive people by convincing them that the social engineer is someone he isn't, or by manipulation.
(Multiple Choice)
4.9/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)