Unit 7 - Recon - Test

Last updated over 2 years ago
27 questions
1

If an IP address has all 1's in the host bit positions then it is the ________________ address for the network.

1

The subnet mask identifies the ____________ part of the IP address

1

Select the Google advanced operator used to represent "any word".

1

I really love Pixar.com and want to find other websites like it. Which Google advanced operator should I use?

1

Here is the search term: three.blind.mice
What Google advanced operator could be used to replace the periods?

1

Fingerprinting in network scanning refers to

1

Which of the following tools can be used either in interactive or non-interactive mode?

1

Which of the following DNS record types will translate names to IPv6 addresses?

1

The 127.0.0.1 IP address is known as the _____________________ address.

1

Which of these is NOT a cybersecurity goal of network segmentation?

1

Write a dork to find pages with any of these words: teenage turtle ninja But it should not have this word: mutant. It must be on a government website

1

To find the email address of the domain administrator, I should use:

1

If an IP address has all O's in the host bit positions then it is the ________________ address for the network.

1

Given an IP address with the subnet mask as
50.206.209.34 /16
State the NetID of this IP

1

_____________________ identify the computers in a network and try to find details  such as services, hostnames, file shares, usernames, etc.

1

__________________ a software tool that enumerates and  fingerprints devices in a network to identify vulnerabilities

1

Which of the following is NOT an output of the nmap scanning?

1

While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?

1

Given nmap -sT, if a port is open it will respond with

1

State True or False.
nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.

1

State True or False.
nmap and nslookup ARE hacking tools.

1

State True or False.
A MAC address refers to the physical address of a device and it is usually not easy to change it.

1

State True or False.
In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.

1

To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26

1

Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.

1

nslookup is a tool used to search / perform

1

DNS is a database that is used to map