Exam 1: Applying Environmental Reconnaissance

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is not one of the recognized pairs of network types?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

B

Which of the following is not a principle that is exploited in social engineering?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

C

___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

Social media profiling

What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?

(Short Answer)
4.8/5
(34)

Which of the following is not a common use of an automated email harvesting tool?

(Multiple Choice)
4.9/5
(40)

The name of the ______________ tool is an abbreviation for "network mapper."

(Short Answer)
4.7/5
(41)

______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.

(Short Answer)
5.0/5
(40)

Which of the following is a networking program that tests whether a particular host can be reached?

(Multiple Choice)
4.9/5
(27)

Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.

(True/False)
4.8/5
(36)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)