Deck 1: Applying Environmental Reconnaissance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
Play
Full screen (f)
Deck 1: Applying Environmental Reconnaissance
1
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
Social media profiling
2
Which of the following is not a common use of an automated email harvesting tool?
A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
C
3
Which of the following is not a principle that is exploited in social engineering?
A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
C
4
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not one of the recognized pairs of network types?
A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is a networking program that tests whether a particular host can be reached?
A) ifconfig
B) tracert
C) ping
D) nslookup
A) ifconfig
B) tracert
C) ping
D) nslookup
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
The name of the ______________ tool is an abbreviation for "network mapper."
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck