Log in
Sign up for FREE
arrow_back
Library

Unit 7 - Recon - Test

star
star
star
star
star
Last updated about 3 years ago
27 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Question 1
1.

Question 2
2.

Question 3
3.

Question 4
4.

Question 5
5.

Question 6
6.

Question 7
7.

Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Write a dork to find pages with any of these words: teenage turtle ninja But it should not have this word: mutant. It must be on a government website

Question 12
12.

Question 13
13.

Question 14
14.

Given an IP address with the subnet mask as
50.206.209.34 /16
State the NetID of this IP

Question 15
15.

_____________________ identify the computers in a network and try to find details  such as services, hostnames, file shares, usernames, etc.

Question 16
16.

Question 17
17.

Question 18
18.

While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?

Question 19
19.

Question 20
20.

Question 21
21.

Question 22
22.

Question 23
23.

Question 24
24.

To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26

Question 25
25.

Question 26
26.

Question 27
27.

If an IP address has all 1's in the host bit positions then it is the ________________ address for the network.
Subnet
NetID
Loopback
Broadcast
The subnet mask identifies the ____________ part of the IP address
Routing
Host
Network
Class
Select the Google advanced operator used to represent "any word".
|
*
+
" "
I really love Pixar.com and want to find other websites like it. Which Google advanced operator should I use?
related:
ext:
site:
inurl:
Here is the search term: three.blind.mice
What Google advanced operator could be used to replace the periods?
|
*
+
" "
Fingerprinting in network scanning refers to
identifying listening services on the system
identify the OS running on the system
identifying active hosts in the system
identifying contact info for a domain
Which of the following tools can be used either in interactive or non-interactive mode?
nslookup
whois
nmap
netstat
Which of the following DNS record types will translate names to IPv6 addresses?
A
MX
AAAA
TXT
The 127.0.0.1 IP address is known as the _____________________ address.
subnet
default
loopback
routing
Which of these is NOT a cybersecurity goal of network segmentation?
limit how many devices can be in the network.
limit which internal departments can exchange information.
limit how far an intruder or malware can reach into the network.
To find the email address of the domain administrator, I should use:
nslookup with type AAAA
Google Dorking
whois
MX
If an IP address has all O's in the host bit positions then it is the ________________ address for the network.
Subnet
Broadcast
NetID
Loopback
__________________ a software tool that enumerates and  fingerprints devices in a network to identify vulnerabilities
nslookup
whois
nmap
none of the above
Which of the following is NOT an output of the nmap scanning?
OS lookup
Host lookup
Domain Lookup
Service Lookup
Given nmap -sT, if a port is open it will respond with
an IP address
SYN/ACK
RST/ACK
a domain name
State True or False.
nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.
True
False
State True or False.
nmap and nslookup ARE hacking tools.
True
False
State True or False.
A MAC address refers to the physical address of a device and it is usually not easy to change it.
True
False
State True or False.
In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.
True
False
Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.
Active
Passive
nslookup is a tool used to search / perform
public info from domain registrations
public domain name system databases
advanced google search
DNS is a database that is used to map
Internet names to their corresponding IP addresses.
IP addresses to their corresponding MAC addresses
MAC addresses to their corresponding IP addresses.