Log in
Sign up for FREE
arrow_back
Library

Unit 7 - Recon - Test

star
star
star
star
star
Last updated almost 3 years ago
27 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Question 1
1.

If an IP address has all 1's in the host bit positions then it is the ________________ address for the network.

Question 2
2.

The subnet mask identifies the ____________ part of the IP address

Question 3
3.

Select the Google advanced operator used to represent "any word".

Question 4
4.

I really love Pixar.com and want to find other websites like it. Which Google advanced operator should I use?

Question 5
5.

Here is the search term: three.blind.mice
What Google advanced operator could be used to replace the periods?

Question 6
6.

Fingerprinting in network scanning refers to

Question 7
7.

Which of the following tools can be used either in interactive or non-interactive mode?

Question 8
8.

Which of the following DNS record types will translate names to IPv6 addresses?

Question 9
9.

The 127.0.0.1 IP address is known as the _____________________ address.

Question 10
10.

Which of these is NOT a cybersecurity goal of network segmentation?

Question 11
11.

Write a dork to find pages with any of these words: teenage turtle ninja But it should not have this word: mutant. It must be on a government website

Question 12
12.

To find the email address of the domain administrator, I should use:

Question 13
13.

If an IP address has all O's in the host bit positions then it is the ________________ address for the network.

Question 14
14.

Given an IP address with the subnet mask as
50.206.209.34 /16
State the NetID of this IP

Question 15
15.

_____________________ identify the computers in a network and try to find details  such as services, hostnames, file shares, usernames, etc.

Question 16
16.

__________________ a software tool that enumerates and  fingerprints devices in a network to identify vulnerabilities

Question 17
17.

Which of the following is NOT an output of the nmap scanning?

Question 18
18.

While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?

Question 19
19.

Given nmap -sT, if a port is open it will respond with

Question 20
20.

State True or False.
nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.

Question 21
21.

State True or False.
nmap and nslookup ARE hacking tools.

Question 22
22.

State True or False.
A MAC address refers to the physical address of a device and it is usually not easy to change it.

Question 23
23.

State True or False.
In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.

Question 24
24.

To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26

Question 25
25.

Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.

Question 26
26.

nslookup is a tool used to search / perform

Question 27
27.

DNS is a database that is used to map