Deck 1: Applying Environmental Reconnaissance

Full screen (f)
exit full mode
Question
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is not a common use of an automated email harvesting tool?

A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
Question
Which of the following is not a principle that is exploited in social engineering?

A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
Question
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
Question
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
Question
Which of the following is not one of the recognized pairs of network types?

A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
Question
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
Question
Which of the following is a networking program that tests whether a particular host can be reached?

A) ifconfig
B) tracert
C) ping
D) nslookup
Question
The name of the ______________ tool is an abbreviation for "network mapper."
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Applying Environmental Reconnaissance
1
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
Social media profiling
2
Which of the following is not a common use of an automated email harvesting tool?

A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
C
3
Which of the following is not a principle that is exploited in social engineering?

A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
C
4
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not one of the recognized pairs of network types?

A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is a networking program that tests whether a particular host can be reached?

A) ifconfig
B) tracert
C) ping
D) nslookup
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
The name of the ______________ tool is an abbreviation for "network mapper."
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 9 flashcards in this deck.