Deck 2: Reconnaissance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 2: Reconnaissance
1
Reconnaissance is not by definition illegal, and many reconnaissance techniques are completely legal.
True
2
The strongest link in any security scheme is the user.
False
3
Most social engineering attacks are opportunistic: the hacker uses whatever technique he or she thinks fits the situation.
True
4
Breaking CD-ROMs is sufficient to destroy their data, as data cannot be recovered from broken disks.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
____ uses influence and persuasion to deceive people by convincing them that the social engineer is someone he isn't, or by manipulation.
A)Network enumeration
B)Network penetration
C)Social enumeration
D)Social engineering
A)Network enumeration
B)Network penetration
C)Social enumeration
D)Social engineering
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a method of achieving access to information by actually joining the organization as an employee or a consultant.
A)Deception
B)Bribery
C)Impersonation
D)Conformity
A)Deception
B)Bribery
C)Impersonation
D)Conformity
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
With ____, a user is tricked into giving private information about his or her account with a known large organization.
A)conformity
B)phishing
C)deception
D)pharming
A)conformity
B)phishing
C)deception
D)pharming
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
Newsgroups are part of an online bulletin board system called ____, which contains groups covering a huge variety of subjects.
A)GROUPS
B)ARPANET
C)USENET
D)NEWSNET
A)GROUPS
B)ARPANET
C)USENET
D)NEWSNET
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
____ is an Internet tool that aids in retrieving domain name-specific information from the NSI Registrar database.
A)WHOIS
B)Locate
C)DNS
D)Whereis
A)WHOIS
B)Locate
C)DNS
D)Whereis
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
____________________ is the act of locating targets and developing the methods necessary to attack those targets successfully.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is the process of identifying domain names as well as other resources on the target network.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is a DNS feature that lets a DNS server update its database with the list of domain names in another DNS server.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
There are two ping utilities available for a Linux or Unix machine: ping and ____________________.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
The Linux command ____________________ shows you where the files appear in your PATH.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
Describe some legal reconnaissance activities.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
Describe some illegal reconnaissance activities.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
Describe conformity as a social engineering technique.
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck