Unit 7 - Recon - Test
star
star
star
star
star
Last updated over 2 years ago
27 questions
1
If an IP address has all 1's in the host bit positions then it is the ________________ address for the network.
If an IP address has all 1's in the host bit positions then it is the ________________ address for the network.
1
The subnet mask identifies the ____________ part of the IP address
The subnet mask identifies the ____________ part of the IP address
1
Select the Google advanced operator used to represent "any word".
Select the Google advanced operator used to represent "any word".
1
I really love Pixar.com and want to find other websites like it. Which Google advanced operator should I use?
I really love Pixar.com and want to find other websites like it. Which Google advanced operator should I use?
1
Here is the search term: three.blind.mice
What Google advanced operator could be used to replace the periods?
Here is the search term: three.blind.mice
What Google advanced operator could be used to replace the periods?
1
Fingerprinting in network scanning refers to
Fingerprinting in network scanning refers to
1
Which of the following tools can be used either in interactive or non-interactive mode?
Which of the following tools can be used either in interactive or non-interactive mode?
1
Which of the following DNS record types will translate names to IPv6 addresses?
Which of the following DNS record types will translate names to IPv6 addresses?
1
The 127.0.0.1 IP address is known as the _____________________ address.
The 127.0.0.1 IP address is known as the _____________________ address.
1
Which of these is NOT a cybersecurity goal of network segmentation?
Which of these is NOT a cybersecurity goal of network segmentation?
1
Write a dork to find pages with any of these words: teenage turtle ninja But it should not have this word: mutant. It must be on a government website
Write a dork to find pages with any of these words: teenage turtle ninja But it should not have this word: mutant. It must be on a government website
1
To find the email address of the domain administrator, I should use:
To find the email address of the domain administrator, I should use:
1
If an IP address has all O's in the host bit positions then it is the ________________ address for the network.
If an IP address has all O's in the host bit positions then it is the ________________ address for the network.
1
Given an IP address with the subnet mask as50.206.209.34 /16State the NetID of this IP
Given an IP address with the subnet mask as
50.206.209.34 /16
State the NetID of this IP
1
_____________________ identify the computers in a network and try to find details such as services, hostnames, file shares, usernames, etc.
_____________________ identify the computers in a network and try to find details such as services, hostnames, file shares, usernames, etc.
1
__________________ a software tool that enumerates and fingerprints devices in a network to identify vulnerabilities
__________________ a software tool that enumerates and fingerprints devices in a network to identify vulnerabilities
1
Which of the following is NOT an output of the nmap scanning?
Which of the following is NOT an output of the nmap scanning?
1
While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?
While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?
1
Given nmap -sT, if a port is open it will respond with
Given nmap -sT, if a port is open it will respond with
1
State True or False.nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.
State True or False.
nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.
1
State True or False.nmap and nslookup ARE hacking tools.
State True or False.
nmap and nslookup ARE hacking tools.
1
State True or False.A MAC address refers to the physical address of a device and it is usually not easy to change it.
State True or False.
A MAC address refers to the physical address of a device and it is usually not easy to change it.
1
State True or False.In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.
State True or False.
In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.
1
To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26
To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26
1
Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.
Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.
1
nslookup is a tool used to search / perform
nslookup is a tool used to search / perform
1
DNS is a database that is used to map
DNS is a database that is used to map